General
-
Target
842b8753aabf49639cf74f56e6c2458bf09282c615775cda988130b227437fdf
-
Size
1.5MB
-
Sample
221130-w1m5qadd97
-
MD5
80526ecbb194fc35cde3ebd8ea2a6772
-
SHA1
d950415c1f48a2f536573820291cd5ca5d5134c1
-
SHA256
842b8753aabf49639cf74f56e6c2458bf09282c615775cda988130b227437fdf
-
SHA512
e5c6f81ccda1833861856e8e475a91a4fcd82071e3553436ca6d6e2f98cf8de17d7318588c471e74506495c0f28b18eab7187ce9da35496f7dfc326387e69815
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXMmHaWgKBx/HN5wQ/HpNBIqS5:Vh+ZkldoPK8Ya7/
Static task
static1
Behavioral task
behavioral1
Sample
842b8753aabf49639cf74f56e6c2458bf09282c615775cda988130b227437fdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
842b8753aabf49639cf74f56e6c2458bf09282c615775cda988130b227437fdf.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
842b8753aabf49639cf74f56e6c2458bf09282c615775cda988130b227437fdf
-
Size
1.5MB
-
MD5
80526ecbb194fc35cde3ebd8ea2a6772
-
SHA1
d950415c1f48a2f536573820291cd5ca5d5134c1
-
SHA256
842b8753aabf49639cf74f56e6c2458bf09282c615775cda988130b227437fdf
-
SHA512
e5c6f81ccda1833861856e8e475a91a4fcd82071e3553436ca6d6e2f98cf8de17d7318588c471e74506495c0f28b18eab7187ce9da35496f7dfc326387e69815
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXMmHaWgKBx/HN5wQ/HpNBIqS5:Vh+ZkldoPK8Ya7/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-