General
-
Target
50aac16f1d22a13adb6a5388b16eed81397926f180aa106fe80ba7e0803199ac
-
Size
672KB
-
Sample
241119-b4jlgszbjq
-
MD5
2dfdee970860313ca665e7b8d7443b9e
-
SHA1
8b02ebd8619c62bcce26c0fd27bc5959f3daa6e1
-
SHA256
50aac16f1d22a13adb6a5388b16eed81397926f180aa106fe80ba7e0803199ac
-
SHA512
aedd45519e0ae2116d77d21cb78cc4b6f471c7cf0dbe2fe1c962e6a5b2993137c726a15017d45410513ac8936dce79f262dee5ac988aff053b62aad018aa126a
-
SSDEEP
12288:WaqLgI3yPiw7hjfYj5U9zwTYA+o9XrSAPTTxNVuP+6IcVzFS1ZCry5cF:EEzatU5FCXrXZY+BcN6ZC8c
Static task
static1
Behavioral task
behavioral1
Sample
MV SHENG XING HAI VC112 VSL's DETAILS.xlsx.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
MV SHENG XING HAI VC112 VSL's DETAILS.xlsx.exe
-
Size
1.1MB
-
MD5
b87124b8106c439f73bb9c3a10392ab4
-
SHA1
0e11440527bf646eab5e4fcdf7f5395d39dd4b7b
-
SHA256
4fae3c9f5d094331098e06bd94823df6f3c6a049398c1f7c46712a46a06dd66e
-
SHA512
c8ebbbc6fb3ffc6edaccbed8de66d920f5017fd600155161911e9b6903a4eda84fed8907d3711153cb60e6ecfd07266e20ffe8717cefd663022c557e540fad6e
-
SSDEEP
24576:vtb20pkaCqT5TBWgNQ7aawGrTkqsvpWq1oIYnvobBSK6A:sVg5tQ7aaHrTE1I6X5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-