General
-
Target
097f466be99535e630c23cad489aeeef8ade13cd877ccc0ee475ca80edb384b2
-
Size
933KB
-
Sample
220530-wz3tsaahdp
-
MD5
ef0b412c55da15868acac519f74e785d
-
SHA1
1619e8268fb53b4bc0629726321baa4760bb38a8
-
SHA256
097f466be99535e630c23cad489aeeef8ade13cd877ccc0ee475ca80edb384b2
-
SHA512
363971cc3fc08f09052f9bf55ac2b85f54ea3a0ba941c0d524fc5e30344860ae38ee12fc23da5467f42c96dd78369873dcd27e2b732c29356fd2533dd4045b06
Static task
static1
Behavioral task
behavioral1
Sample
097f466be99535e630c23cad489aeeef8ade13cd877ccc0ee475ca80edb384b2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
097f466be99535e630c23cad489aeeef8ade13cd877ccc0ee475ca80edb384b2.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
097f466be99535e630c23cad489aeeef8ade13cd877ccc0ee475ca80edb384b2
-
Size
933KB
-
MD5
ef0b412c55da15868acac519f74e785d
-
SHA1
1619e8268fb53b4bc0629726321baa4760bb38a8
-
SHA256
097f466be99535e630c23cad489aeeef8ade13cd877ccc0ee475ca80edb384b2
-
SHA512
363971cc3fc08f09052f9bf55ac2b85f54ea3a0ba941c0d524fc5e30344860ae38ee12fc23da5467f42c96dd78369873dcd27e2b732c29356fd2533dd4045b06
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-