General
-
Target
14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73
-
Size
267KB
-
Sample
230518-qzd8jabb77
-
MD5
f59e8520a25e69615b1ff73210a55bf3
-
SHA1
a060923f0d58b80862bc5cc430ca7d1031f2d40d
-
SHA256
14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73
-
SHA512
b6d2df5a3d69763ff0892078ee6b7a96faefff96b9775b297c1bcc452ade8f71d87ebef6cae5e486e583ae9b11154f755475317ada32ff34cffedcd49879f4e0
-
SSDEEP
6144:vYa6sjKHfwLAECjart8bp7EV1V6kzWjizOUb7uCkVzvNY:vYqjYfiCWpG4HVDpkVzvNY
Static task
static1
Behavioral task
behavioral1
Sample
14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73
-
Size
267KB
-
MD5
f59e8520a25e69615b1ff73210a55bf3
-
SHA1
a060923f0d58b80862bc5cc430ca7d1031f2d40d
-
SHA256
14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73
-
SHA512
b6d2df5a3d69763ff0892078ee6b7a96faefff96b9775b297c1bcc452ade8f71d87ebef6cae5e486e583ae9b11154f755475317ada32ff34cffedcd49879f4e0
-
SSDEEP
6144:vYa6sjKHfwLAECjart8bp7EV1V6kzWjizOUb7uCkVzvNY:vYqjYfiCWpG4HVDpkVzvNY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-