General
-
Target
3e478eebca76148d4aa24703561f4f35
-
Size
303KB
-
Sample
240102-azc3gafgc4
-
MD5
3e478eebca76148d4aa24703561f4f35
-
SHA1
f6f94f45113f1618dc0a095fc6b244801013cdb1
-
SHA256
7daf1835c9fbc5238ed9d4979d679cefc13c2ce6e15dfad38976df443afaba36
-
SHA512
ccc24400b0ae4a326d857441af628caef72066733c5409150b8e0451370526be4d87912f9abf33ae7056b33c1ec922e84f353b7ee19755a434d3a60d5537ce49
-
SSDEEP
6144:/+ukYqdcl6MqqVWAAbzSzKt7dhuSPMWm0F5whIler4Yly18PkNS8:/nltqe5A/Sz07Rk0F5CrNly1CkN/
Behavioral task
behavioral1
Sample
3e478eebca76148d4aa24703561f4f35.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3e478eebca76148d4aa24703561f4f35.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
3e478eebca76148d4aa24703561f4f35
-
Size
303KB
-
MD5
3e478eebca76148d4aa24703561f4f35
-
SHA1
f6f94f45113f1618dc0a095fc6b244801013cdb1
-
SHA256
7daf1835c9fbc5238ed9d4979d679cefc13c2ce6e15dfad38976df443afaba36
-
SHA512
ccc24400b0ae4a326d857441af628caef72066733c5409150b8e0451370526be4d87912f9abf33ae7056b33c1ec922e84f353b7ee19755a434d3a60d5537ce49
-
SSDEEP
6144:/+ukYqdcl6MqqVWAAbzSzKt7dhuSPMWm0F5whIler4Yly18PkNS8:/nltqe5A/Sz07Rk0F5CrNly1CkN/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-