General
-
Target
tmp
-
Size
266KB
-
Sample
230519-m71vqagc4x
-
MD5
0e06a0f67647db74c0b6719b6c892f2a
-
SHA1
da7c7f0abaa2044c031c3916154fc19405fbcc74
-
SHA256
aafc668d03f2fa59132b86a640f41eac2d2221053152524d99fcc61b7a56c5e4
-
SHA512
d5545ef0c9b140eb9cecc510643f24157e21b8e13e3a04908500b0cc22b41f6140c519de5c644e50ea108b9ee84eb1efd76449d6c44c9a361ebce79b3be76696
-
SSDEEP
6144:vYa6C8IkNwFnB8Qc4wa25gd+iwzSp4nxs+fcTws3R:vYk8IrFnTc4b25biCSWu+UcmR
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230221-en
Malware Config
Targets
-
-
Target
tmp
-
Size
266KB
-
MD5
0e06a0f67647db74c0b6719b6c892f2a
-
SHA1
da7c7f0abaa2044c031c3916154fc19405fbcc74
-
SHA256
aafc668d03f2fa59132b86a640f41eac2d2221053152524d99fcc61b7a56c5e4
-
SHA512
d5545ef0c9b140eb9cecc510643f24157e21b8e13e3a04908500b0cc22b41f6140c519de5c644e50ea108b9ee84eb1efd76449d6c44c9a361ebce79b3be76696
-
SSDEEP
6144:vYa6C8IkNwFnB8Qc4wa25gd+iwzSp4nxs+fcTws3R:vYk8IrFnTc4b25biCSWu+UcmR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-