General
-
Target
8cdb70f9f1f38b8853dfad62d84618bb4f10acce41e9f0fddab422c2c253c994
-
Size
1.2MB
-
Sample
241221-bjfdbsyqbr
-
MD5
ffb44667070a4a921897a26bbfc17b77
-
SHA1
8cde3094e0794a6f7a50b927a390f559df5888f5
-
SHA256
8cdb70f9f1f38b8853dfad62d84618bb4f10acce41e9f0fddab422c2c253c994
-
SHA512
e3f8ccd2f39db18d949f14a7255431e4006b9e2c0903f843cbe6740d65b5438a8c6a4caabc0d7bea563f25e4bf9e7599d67c3a2d57fc5a982715bc7725cb825b
-
SSDEEP
24576:L3Ady3x3chk7TKYi+gHrG4ceFOjenP09dUkJmInb2:oy0k7TbmrKWYUkP2
Static task
static1
Behavioral task
behavioral1
Sample
8cdb70f9f1f38b8853dfad62d84618bb4f10acce41e9f0fddab422c2c253c994.ps1
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
8cdb70f9f1f38b8853dfad62d84618bb4f10acce41e9f0fddab422c2c253c994
-
Size
1.2MB
-
MD5
ffb44667070a4a921897a26bbfc17b77
-
SHA1
8cde3094e0794a6f7a50b927a390f559df5888f5
-
SHA256
8cdb70f9f1f38b8853dfad62d84618bb4f10acce41e9f0fddab422c2c253c994
-
SHA512
e3f8ccd2f39db18d949f14a7255431e4006b9e2c0903f843cbe6740d65b5438a8c6a4caabc0d7bea563f25e4bf9e7599d67c3a2d57fc5a982715bc7725cb825b
-
SSDEEP
24576:L3Ady3x3chk7TKYi+gHrG4ceFOjenP09dUkJmInb2:oy0k7TbmrKWYUkP2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-