General
-
Target
PO 0051-23.exe
-
Size
318KB
-
Sample
230403-gm2nmaee4t
-
MD5
76d08c9a795cb286eb92d8ab41d1bff5
-
SHA1
b00f94fc957f25fcb4fdccb8aad1d679247cde04
-
SHA256
0e4ea6322dba2d469a0e405188c76f6cd9332e193071048192621abf85bf7cdc
-
SHA512
2fb51728fcaca60b38094278e9e9571bc6e4ddd33226614dd9eedd066d7a551fc714a2f8d336ccadf8f8ca690b56339e85b089efdfe315b26f7728e84da23002
-
SSDEEP
6144:PYa63sAnyhbptQUF310y/LGcCn75IDouSHwoX1TzseW6:PYlFn2tFFF0y/LS7ohSHwoX1/seW6
Static task
static1
Behavioral task
behavioral1
Sample
PO 0051-23.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO 0051-23.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
PO 0051-23.exe
-
Size
318KB
-
MD5
76d08c9a795cb286eb92d8ab41d1bff5
-
SHA1
b00f94fc957f25fcb4fdccb8aad1d679247cde04
-
SHA256
0e4ea6322dba2d469a0e405188c76f6cd9332e193071048192621abf85bf7cdc
-
SHA512
2fb51728fcaca60b38094278e9e9571bc6e4ddd33226614dd9eedd066d7a551fc714a2f8d336ccadf8f8ca690b56339e85b089efdfe315b26f7728e84da23002
-
SSDEEP
6144:PYa63sAnyhbptQUF310y/LGcCn75IDouSHwoX1TzseW6:PYlFn2tFFF0y/LS7ohSHwoX1/seW6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-