General
-
Target
bfbda87afcd9cc4f6e39550149d7ebfcaebd2ee97e38d69842d93f7f12c2a05f.exe
-
Size
369KB
-
Sample
241129-ejj83azlcp
-
MD5
ba71b8b432f3c3575bca530cb8993a15
-
SHA1
4253e361af1f8711b09f5031b70c5a16c551c384
-
SHA256
bfbda87afcd9cc4f6e39550149d7ebfcaebd2ee97e38d69842d93f7f12c2a05f
-
SHA512
5a92287dd3feb012d9a3b77372f5160d8e566203b2126dfb3aee3a64a0b8a2c274e542d3c84272240b25b4c0c9e25736ab0d6b303dda2fa7d26a23dfa85cf462
-
SSDEEP
384:jSYfj/Of4imYnyEVPTHWKtL2H0VuM35zlQEew+yTzSf4JM54iICSCr4H444uiiiw:jHjQ4KnyAWkaHRQMwdz+4H4447iiL1i
Static task
static1
Behavioral task
behavioral1
Sample
bfbda87afcd9cc4f6e39550149d7ebfcaebd2ee97e38d69842d93f7f12c2a05f.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
bfbda87afcd9cc4f6e39550149d7ebfcaebd2ee97e38d69842d93f7f12c2a05f.exe
-
Size
369KB
-
MD5
ba71b8b432f3c3575bca530cb8993a15
-
SHA1
4253e361af1f8711b09f5031b70c5a16c551c384
-
SHA256
bfbda87afcd9cc4f6e39550149d7ebfcaebd2ee97e38d69842d93f7f12c2a05f
-
SHA512
5a92287dd3feb012d9a3b77372f5160d8e566203b2126dfb3aee3a64a0b8a2c274e542d3c84272240b25b4c0c9e25736ab0d6b303dda2fa7d26a23dfa85cf462
-
SSDEEP
384:jSYfj/Of4imYnyEVPTHWKtL2H0VuM35zlQEew+yTzSf4JM54iICSCr4H444uiiiw:jHjQ4KnyAWkaHRQMwdz+4H4447iiL1i
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-