General
-
Target
payment copy (2).exe
-
Size
884KB
-
Sample
220930-vlb88sebd6
-
MD5
5cc9f8e39f90f420adda6699196bb877
-
SHA1
a402d16c6dc29521ad519e8a96933578677369c6
-
SHA256
545830c8f3640a7fa7c37115b87fd7c3f8872a580effec10d42a0f4e549c9732
-
SHA512
860c78baa29d378c2cff93baeaa4922ebe9b1cc08cf6ca2160b6cb694962b96c90a26c2b61b870a1a453b307fe343dd5c894ad2bcc51ec6fbd79c15d0fd9d78e
-
SSDEEP
12288:UFWO4z6C42iNOAyPwC5ymqabONmNs3eqjJ5nlaokrZ5CHj8hgDn++1EV3gtZvbNC:UwO4ut1tu9qOsJjrl2
Static task
static1
Behavioral task
behavioral1
Sample
payment copy (2).exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
payment copy (2).exe
-
Size
884KB
-
MD5
5cc9f8e39f90f420adda6699196bb877
-
SHA1
a402d16c6dc29521ad519e8a96933578677369c6
-
SHA256
545830c8f3640a7fa7c37115b87fd7c3f8872a580effec10d42a0f4e549c9732
-
SHA512
860c78baa29d378c2cff93baeaa4922ebe9b1cc08cf6ca2160b6cb694962b96c90a26c2b61b870a1a453b307fe343dd5c894ad2bcc51ec6fbd79c15d0fd9d78e
-
SSDEEP
12288:UFWO4z6C42iNOAyPwC5ymqabONmNs3eqjJ5nlaokrZ5CHj8hgDn++1EV3gtZvbNC:UwO4ut1tu9qOsJjrl2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-