General
-
Target
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
-
Size
900KB
-
Sample
221204-srj5xsbc67
-
MD5
c68e2fbcf0d6aa032d875eda9d5064f1
-
SHA1
2a21c0df2831bf8b91c40031f9357afca0adfc72
-
SHA256
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
-
SHA512
c1299d8f7c8893dffd7012f13dd3f03d6ede311c3029514f4d5c3b6257809642e0b5ae1ac0dcc8f6ae4fde4ec9000129e3ab69ad8d0d2760baed3abc3e088073
-
SSDEEP
6144:QRB3vG8NWZg1ekK2faTCrT8qi43C2bRjgDybJ6yiszBSN+kWAbjouwootyL:muc7KTqi4/pOybhiWBQuuwootyL
Static task
static1
Behavioral task
behavioral1
Sample
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
-
Size
900KB
-
MD5
c68e2fbcf0d6aa032d875eda9d5064f1
-
SHA1
2a21c0df2831bf8b91c40031f9357afca0adfc72
-
SHA256
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
-
SHA512
c1299d8f7c8893dffd7012f13dd3f03d6ede311c3029514f4d5c3b6257809642e0b5ae1ac0dcc8f6ae4fde4ec9000129e3ab69ad8d0d2760baed3abc3e088073
-
SSDEEP
6144:QRB3vG8NWZg1ekK2faTCrT8qi43C2bRjgDybJ6yiszBSN+kWAbjouwootyL:muc7KTqi4/pOybhiWBQuuwootyL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-