General
-
Target
1V7H2_4fae3c9f5d094331098e06bd94823df6f3c6a049398c1f7c46712a46a06dd66e
-
Size
1.1MB
-
Sample
241119-ld5q5sylbq
-
MD5
b87124b8106c439f73bb9c3a10392ab4
-
SHA1
0e11440527bf646eab5e4fcdf7f5395d39dd4b7b
-
SHA256
4fae3c9f5d094331098e06bd94823df6f3c6a049398c1f7c46712a46a06dd66e
-
SHA512
c8ebbbc6fb3ffc6edaccbed8de66d920f5017fd600155161911e9b6903a4eda84fed8907d3711153cb60e6ecfd07266e20ffe8717cefd663022c557e540fad6e
-
SSDEEP
24576:vtb20pkaCqT5TBWgNQ7aawGrTkqsvpWq1oIYnvobBSK6A:sVg5tQ7aaHrTE1I6X5
Static task
static1
Behavioral task
behavioral1
Sample
1V7H2_4fae3c9f5d094331098e06bd94823df6f3c6a049398c1f7c46712a46a06dd66e.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
1V7H2_4fae3c9f5d094331098e06bd94823df6f3c6a049398c1f7c46712a46a06dd66e
-
Size
1.1MB
-
MD5
b87124b8106c439f73bb9c3a10392ab4
-
SHA1
0e11440527bf646eab5e4fcdf7f5395d39dd4b7b
-
SHA256
4fae3c9f5d094331098e06bd94823df6f3c6a049398c1f7c46712a46a06dd66e
-
SHA512
c8ebbbc6fb3ffc6edaccbed8de66d920f5017fd600155161911e9b6903a4eda84fed8907d3711153cb60e6ecfd07266e20ffe8717cefd663022c557e540fad6e
-
SSDEEP
24576:vtb20pkaCqT5TBWgNQ7aawGrTkqsvpWq1oIYnvobBSK6A:sVg5tQ7aaHrTE1I6X5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-