General
-
Target
06c1c3c63a976462f1e561a446a84a91
-
Size
564KB
-
Sample
230320-amn9zach31
-
MD5
06c1c3c63a976462f1e561a446a84a91
-
SHA1
1892b56de0be7db83aa0e181fd72b454f42f3c84
-
SHA256
ebc2d7d93d9ab3149600a404723800e4966198074001f0b6708ddac29fe573e1
-
SHA512
19142089d71a7e5165f7389a643ff2bd3aa307859c0aa2a9ad8ee1ab2be0d9642c78651ff141402d67734993d1a68afb42903cea4d810163eff7cb65645c97e9
-
SSDEEP
12288:/YpdTHOHf/NRp/2mifXpS4ux89VQ6hPdUYrFWiQUVw30:/YpFuHfvp/SPY4uxeQsyYrEDUVw30
Static task
static1
Behavioral task
behavioral1
Sample
06c1c3c63a976462f1e561a446a84a91.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
06c1c3c63a976462f1e561a446a84a91.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
06c1c3c63a976462f1e561a446a84a91
-
Size
564KB
-
MD5
06c1c3c63a976462f1e561a446a84a91
-
SHA1
1892b56de0be7db83aa0e181fd72b454f42f3c84
-
SHA256
ebc2d7d93d9ab3149600a404723800e4966198074001f0b6708ddac29fe573e1
-
SHA512
19142089d71a7e5165f7389a643ff2bd3aa307859c0aa2a9ad8ee1ab2be0d9642c78651ff141402d67734993d1a68afb42903cea4d810163eff7cb65645c97e9
-
SSDEEP
12288:/YpdTHOHf/NRp/2mifXpS4ux89VQ6hPdUYrFWiQUVw30:/YpFuHfvp/SPY4uxeQsyYrEDUVw30
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-