General
-
Target
c3920d8006e3e708991f93c1ee2c4f1f38d116ce3bbcce5a0072d11d8f8a19a3
-
Size
1.1MB
-
Sample
241119-bw7y4stlfq
-
MD5
b212fa3352a4a6241a7f9e4a4c5f34c7
-
SHA1
a6f48804432852af371ecf57a8d20c9d431cecab
-
SHA256
c3920d8006e3e708991f93c1ee2c4f1f38d116ce3bbcce5a0072d11d8f8a19a3
-
SHA512
d1c2be0deacf9460dc281ee3f1d4bf1e45c0d1f99409a570242446ec2eb9d417ff93f302e09e70c7003b62bb898cbae7683cb3821fd46468d425ff555bfcda97
-
SSDEEP
24576:stb20pkaCqT5TBWgNQ7aJVI176j07prnV6A:VVg5tQ7aJVIW0T5
Static task
static1
Behavioral task
behavioral1
Sample
c3920d8006e3e708991f93c1ee2c4f1f38d116ce3bbcce5a0072d11d8f8a19a3.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c3920d8006e3e708991f93c1ee2c4f1f38d116ce3bbcce5a0072d11d8f8a19a3
-
Size
1.1MB
-
MD5
b212fa3352a4a6241a7f9e4a4c5f34c7
-
SHA1
a6f48804432852af371ecf57a8d20c9d431cecab
-
SHA256
c3920d8006e3e708991f93c1ee2c4f1f38d116ce3bbcce5a0072d11d8f8a19a3
-
SHA512
d1c2be0deacf9460dc281ee3f1d4bf1e45c0d1f99409a570242446ec2eb9d417ff93f302e09e70c7003b62bb898cbae7683cb3821fd46468d425ff555bfcda97
-
SSDEEP
24576:stb20pkaCqT5TBWgNQ7aJVI176j07prnV6A:VVg5tQ7aJVIW0T5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-