General
-
Target
16cb75f304ead30d5c624f026272b3c6a3b533f087197c240fa92b1b69646045
-
Size
638KB
-
Sample
230525-g9f1fagg6v
-
MD5
35b9124a72b939bddecd642532c56d4f
-
SHA1
f9e9180f483a4b98a060f68a7df2ec38c7cb930a
-
SHA256
16cb75f304ead30d5c624f026272b3c6a3b533f087197c240fa92b1b69646045
-
SHA512
d2be6d3d097e300b180747942c6c526a8474ec066f8e322d1fb860b75e3935d7f4b87b352b28409cd65680689ab23bb48f408b6f1938d93d623475bf3a0187c2
-
SSDEEP
12288:x2iN/I3c8Vrao5qrEUt8R9XIBbAaz2a1P9mnwK7t8hXZ:x1hIFao5qrIRpIBx1DKGhp
Static task
static1
Behavioral task
behavioral1
Sample
16cb75f304ead30d5c624f026272b3c6a3b533f087197c240fa92b1b69646045.exe
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
16cb75f304ead30d5c624f026272b3c6a3b533f087197c240fa92b1b69646045
-
Size
638KB
-
MD5
35b9124a72b939bddecd642532c56d4f
-
SHA1
f9e9180f483a4b98a060f68a7df2ec38c7cb930a
-
SHA256
16cb75f304ead30d5c624f026272b3c6a3b533f087197c240fa92b1b69646045
-
SHA512
d2be6d3d097e300b180747942c6c526a8474ec066f8e322d1fb860b75e3935d7f4b87b352b28409cd65680689ab23bb48f408b6f1938d93d623475bf3a0187c2
-
SSDEEP
12288:x2iN/I3c8Vrao5qrEUt8R9XIBbAaz2a1P9mnwK7t8hXZ:x1hIFao5qrIRpIBx1DKGhp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-