General
-
Target
8c0affc928dd817fa864a9211f11f89fd36701aa
-
Size
571KB
-
Sample
230112-xwb3bshg68
-
MD5
95bfd4665a21e54e620676e1cef82fc2
-
SHA1
8c0affc928dd817fa864a9211f11f89fd36701aa
-
SHA256
915cb8994b02a7d735b230b000ee1d7797500c5c0846b24103a9ad63956cbb41
-
SHA512
7ec7c12d4369b61a282eec87be532923f8aa2b24e24a246834030610e1d143904e25c27f1328186a2100d157eb3104e7e5ef3e20aca8c75370fdb043153d7a19
-
SSDEEP
12288:gYziYVrBhcLnvtVsKECqKgYGT+mSziTPsJrnK4/im:gYziY9q3zcVYGTRaib0n1im
Static task
static1
Behavioral task
behavioral1
Sample
8c0affc928dd817fa864a9211f11f89fd36701aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c0affc928dd817fa864a9211f11f89fd36701aa.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
8c0affc928dd817fa864a9211f11f89fd36701aa
-
Size
571KB
-
MD5
95bfd4665a21e54e620676e1cef82fc2
-
SHA1
8c0affc928dd817fa864a9211f11f89fd36701aa
-
SHA256
915cb8994b02a7d735b230b000ee1d7797500c5c0846b24103a9ad63956cbb41
-
SHA512
7ec7c12d4369b61a282eec87be532923f8aa2b24e24a246834030610e1d143904e25c27f1328186a2100d157eb3104e7e5ef3e20aca8c75370fdb043153d7a19
-
SSDEEP
12288:gYziYVrBhcLnvtVsKECqKgYGT+mSziTPsJrnK4/im:gYziY9q3zcVYGTRaib0n1im
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-