General
-
Target
033304a9a935c4d0d64769245abfe3ae.exe
-
Size
350KB
-
Sample
211216-kpavgacchp
-
MD5
033304a9a935c4d0d64769245abfe3ae
-
SHA1
ebe539aeb57b78a3ad8085fe61dcc5ce3bfb6fd9
-
SHA256
6500927c19e228cc116484a103ba594fdeadccf06159332ead8cc9b3d9da83db
-
SHA512
f9da9c01941b5694c46d9b8f1fb4d4710a025409b672eb62ca913979f0aa26fc1ac8eb922388c4c29c8f7405ad268a871221cd38b0494c18936612756af021c0
Static task
static1
Behavioral task
behavioral1
Sample
033304a9a935c4d0d64769245abfe3ae.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
033304a9a935c4d0d64769245abfe3ae.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
033304a9a935c4d0d64769245abfe3ae.exe
-
Size
350KB
-
MD5
033304a9a935c4d0d64769245abfe3ae
-
SHA1
ebe539aeb57b78a3ad8085fe61dcc5ce3bfb6fd9
-
SHA256
6500927c19e228cc116484a103ba594fdeadccf06159332ead8cc9b3d9da83db
-
SHA512
f9da9c01941b5694c46d9b8f1fb4d4710a025409b672eb62ca913979f0aa26fc1ac8eb922388c4c29c8f7405ad268a871221cd38b0494c18936612756af021c0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
AgentTesla Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-