General
-
Target
1f084d01838c44388b81723955709c9dfebeaf40fb0e4fce6a433e429ed401f0
-
Size
1.1MB
-
Sample
240704-bpad9syarf
-
MD5
3805f98168e0c1a1b50ebdb325dd4bbf
-
SHA1
257cc82b5cc5ede2b550bf077f6368db2cb39c32
-
SHA256
1f084d01838c44388b81723955709c9dfebeaf40fb0e4fce6a433e429ed401f0
-
SHA512
117226e9d7754e29992dd337e23aa8eb9d66eacbb6f42d896fd813ca4bf96c0b48dafdd1d3ef08ba3973962661f9d39f0f3a5697a71f7a27b0f985a39baf8fd3
-
SSDEEP
24576:zAHnh+eWsN3skA4RV1Hom2KXMmHa7Vkpp5IPjPr3iCkUYX5:+h+ZkldoPK8Ya7mpp5IPjPTiCkUU
Static task
static1
Behavioral task
behavioral1
Sample
1f084d01838c44388b81723955709c9dfebeaf40fb0e4fce6a433e429ed401f0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f084d01838c44388b81723955709c9dfebeaf40fb0e4fce6a433e429ed401f0.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
1f084d01838c44388b81723955709c9dfebeaf40fb0e4fce6a433e429ed401f0
-
Size
1.1MB
-
MD5
3805f98168e0c1a1b50ebdb325dd4bbf
-
SHA1
257cc82b5cc5ede2b550bf077f6368db2cb39c32
-
SHA256
1f084d01838c44388b81723955709c9dfebeaf40fb0e4fce6a433e429ed401f0
-
SHA512
117226e9d7754e29992dd337e23aa8eb9d66eacbb6f42d896fd813ca4bf96c0b48dafdd1d3ef08ba3973962661f9d39f0f3a5697a71f7a27b0f985a39baf8fd3
-
SSDEEP
24576:zAHnh+eWsN3skA4RV1Hom2KXMmHa7Vkpp5IPjPr3iCkUYX5:+h+ZkldoPK8Ya7mpp5IPjPTiCkUU
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-