General
-
Target
7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7
-
Size
1.2MB
-
Sample
221130-plgk3adb6s
-
MD5
0c9c80a0373b2081fa5bb61e8336fb45
-
SHA1
487a24e1bca88280b8a66da12f77179b1337bd80
-
SHA256
7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7
-
SHA512
9d411ffefd29dbe8df0ccaf0270d7a10c46987b8995f1ccd0ce6db5b0d616e8a2249053c3327b8de01bccb88de667933067018c7947c3197da2db498af0e8362
-
SSDEEP
24576:WAHnh+eWsN3skA4RV1Hom2KXMmHaf1mczftS95:xh+ZkldoPK8YafYQftQ
Static task
static1
Behavioral task
behavioral1
Sample
7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7
-
Size
1.2MB
-
MD5
0c9c80a0373b2081fa5bb61e8336fb45
-
SHA1
487a24e1bca88280b8a66da12f77179b1337bd80
-
SHA256
7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7
-
SHA512
9d411ffefd29dbe8df0ccaf0270d7a10c46987b8995f1ccd0ce6db5b0d616e8a2249053c3327b8de01bccb88de667933067018c7947c3197da2db498af0e8362
-
SSDEEP
24576:WAHnh+eWsN3skA4RV1Hom2KXMmHaf1mczftS95:xh+ZkldoPK8YafYQftQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-