General
-
Target
b81d1a6210adc68812a52286c053a61a3ce7a8d580d3398765ca0e5c89ba383f.exe
-
Size
643KB
-
Sample
240524-ksqp4abg72
-
MD5
6db8690c20e7c623f80ad4e96d735aeb
-
SHA1
4f8012f7fe975fbd1f1e7aa20db6f442be7ff58e
-
SHA256
b81d1a6210adc68812a52286c053a61a3ce7a8d580d3398765ca0e5c89ba383f
-
SHA512
95a119dc382c28a619edfe288ce662b9664294d149ef68a73fbc4b3bbdee5aae019c618f33d251a04dd98f7e64e5d32c6953d9c30a035eed8d43dc4b2e04d2d6
-
SSDEEP
12288:cyEL1kw7cj3oDQWCymx1iKR6eiY1L9DN7gOcbtp:cyEJIjYu1DR6e9ZULp
Static task
static1
Behavioral task
behavioral1
Sample
b81d1a6210adc68812a52286c053a61a3ce7a8d580d3398765ca0e5c89ba383f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b81d1a6210adc68812a52286c053a61a3ce7a8d580d3398765ca0e5c89ba383f.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
b81d1a6210adc68812a52286c053a61a3ce7a8d580d3398765ca0e5c89ba383f.exe
-
Size
643KB
-
MD5
6db8690c20e7c623f80ad4e96d735aeb
-
SHA1
4f8012f7fe975fbd1f1e7aa20db6f442be7ff58e
-
SHA256
b81d1a6210adc68812a52286c053a61a3ce7a8d580d3398765ca0e5c89ba383f
-
SHA512
95a119dc382c28a619edfe288ce662b9664294d149ef68a73fbc4b3bbdee5aae019c618f33d251a04dd98f7e64e5d32c6953d9c30a035eed8d43dc4b2e04d2d6
-
SSDEEP
12288:cyEL1kw7cj3oDQWCymx1iKR6eiY1L9DN7gOcbtp:cyEJIjYu1DR6e9ZULp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-