General
-
Target
7c50b2f8b626bcf9e6ab91d75cf7317f97bc76d9e438f5ffb14f6f084fa55a12
-
Size
1.4MB
-
Sample
250114-r8jeaasrbn
-
MD5
3dd8f55289e07330e59c3e7c0de38220
-
SHA1
596d4c9d3224dca3af19d6dfe0e6b7285c7111c0
-
SHA256
7c50b2f8b626bcf9e6ab91d75cf7317f97bc76d9e438f5ffb14f6f084fa55a12
-
SHA512
f4c5a0d375a915479969f9de8ea013f999827b38ac6ccd65d6c30cd2c31de10702c9cd131ace5f7ea31ac8acb498cb6707c6cfdeca7f3e62029921cf034c7f41
-
SSDEEP
24576:/ww8M5h9p5ddUxcpbk8BeXg3B9v1gFwf9SKt6gojYae2avX+jht0W1Ox2U9r:civ9dUxcRk88XwBPgKfsK0HjD/8ujD5o
Static task
static1
Behavioral task
behavioral1
Sample
IMAGES.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
IMAGES.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
IMAGES.exe
-
Size
1.8MB
-
MD5
8c07bdb9cca0c5a4d049ffc1467464a3
-
SHA1
72efd059636e8eb12fcd164ec5aa4f9c9db1c43a
-
SHA256
7bac2b97db6f10df47459cbb698c2f27632c65b5c5f7eef3a8c0678ae1d6f44c
-
SHA512
b924b0919d8a961a0616182f396957cffa645b11019f81b0f598cabe899da5223b68694217f1950083f4ace625f9330dbd263ac93907e86e91037079a842ce21
-
SSDEEP
49152:ITvC/MTQYxsWR7aafXwfXgGJII0zf39Ka/BxEwUfE:AjTQYxsWR9nGmDBh/BSTc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-