General
-
Target
51bf73d20e01e9c502f31708c546ab2a661e23fef4964b94eb1b630074e0acf4
-
Size
844KB
-
Sample
220717-s1njpsedel
-
MD5
e3b0ec5a277f6083bcf0eef4327579f2
-
SHA1
80dcc45ba3b176b57e340854dbcbf71212138220
-
SHA256
51bf73d20e01e9c502f31708c546ab2a661e23fef4964b94eb1b630074e0acf4
-
SHA512
37b83f8d4e9fb97186bdc79a18001f2c2364dbdec670805ed12d771ddc54e660923d3e2918d112627bb236d06de2a34e16a76a0612b84575fdd31443893411c1
Static task
static1
Behavioral task
behavioral1
Sample
51bf73d20e01e9c502f31708c546ab2a661e23fef4964b94eb1b630074e0acf4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
51bf73d20e01e9c502f31708c546ab2a661e23fef4964b94eb1b630074e0acf4.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
51bf73d20e01e9c502f31708c546ab2a661e23fef4964b94eb1b630074e0acf4
-
Size
844KB
-
MD5
e3b0ec5a277f6083bcf0eef4327579f2
-
SHA1
80dcc45ba3b176b57e340854dbcbf71212138220
-
SHA256
51bf73d20e01e9c502f31708c546ab2a661e23fef4964b94eb1b630074e0acf4
-
SHA512
37b83f8d4e9fb97186bdc79a18001f2c2364dbdec670805ed12d771ddc54e660923d3e2918d112627bb236d06de2a34e16a76a0612b84575fdd31443893411c1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-