General
-
Target
d560a00761c873c47778db0e4501b93e.bin
-
Size
726KB
-
Sample
240705-dxpj9s1gmm
-
MD5
38fb4bdf4b48ddf4c1526b9c07fcfc40
-
SHA1
41f13a537fd497641ff8a61fa3bca37fe2e71983
-
SHA256
c7c7d92bd2d00b9f23f6f8f0946f8a584e51e3a811e6b51bb340f36e5113ff1d
-
SHA512
76d01c4ced5a5f1ddc17f2a7268885e7e4369b1330f9e778f74eacc7b8d2ab3d5b9068e27581b1b209a34ce470c1a8863696d26f2f33e4118af9962c63da6635
-
SSDEEP
12288:R+iu8MTA61Bg5MuCjeqqhvgNggn/L6grDXNRM1nx5Jgxdwxr74XxX2d9M:IiXMk8B4MuCeqTxuk7MRDJ2YM
Static task
static1
Behavioral task
behavioral1
Sample
e0b2a21d46eaafd76da52888f1fbbca89592301d69cf9cfe6be58992aa021f9a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e0b2a21d46eaafd76da52888f1fbbca89592301d69cf9cfe6be58992aa021f9a.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
e0b2a21d46eaafd76da52888f1fbbca89592301d69cf9cfe6be58992aa021f9a.exe
-
Size
1.1MB
-
MD5
d560a00761c873c47778db0e4501b93e
-
SHA1
c8032767d547373b2d4c56045eaebb831d49fc3a
-
SHA256
e0b2a21d46eaafd76da52888f1fbbca89592301d69cf9cfe6be58992aa021f9a
-
SHA512
c72a0d4ce42d6290134d26627a02dafcd7f79f79e036ae975381d2d5c68f5897331b1e44a65487b9f0c27d7531828d60aeefc47d9a5ee607f559e680307824a5
-
SSDEEP
24576:zAHnh+eWsN3skA4RV1Hom2KXMmHa1ATE0kX+G7uEEbuyX5:+h+ZkldoPK8Ya1Aot+GCE2
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-