General
-
Target
c93e37e35c4c7f767a5bdab8341d8c2351edb769a41b0c9c229c592dbfe14ff2
-
Size
945KB
-
Sample
241221-bhs8ssyle1
-
MD5
915a6f3675442c388110fb11db36620a
-
SHA1
45a8cb74384a6e91bd154f75b79fc6af99abb935
-
SHA256
c93e37e35c4c7f767a5bdab8341d8c2351edb769a41b0c9c229c592dbfe14ff2
-
SHA512
7e5acbc50998ba6ff79ec9b401c192166b6385e0af44839adf93531226fe009accd1d9f02fa647d300042e2d39d92954795c73ae08ae367881f0b1fcbb77c545
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCAKr4GEn9TFyHEg+eGHX:7JZoQrbTFZY1iaCAU89TIHEg+eiX
Static task
static1
Behavioral task
behavioral1
Sample
c93e37e35c4c7f767a5bdab8341d8c2351edb769a41b0c9c229c592dbfe14ff2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c93e37e35c4c7f767a5bdab8341d8c2351edb769a41b0c9c229c592dbfe14ff2.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c93e37e35c4c7f767a5bdab8341d8c2351edb769a41b0c9c229c592dbfe14ff2
-
Size
945KB
-
MD5
915a6f3675442c388110fb11db36620a
-
SHA1
45a8cb74384a6e91bd154f75b79fc6af99abb935
-
SHA256
c93e37e35c4c7f767a5bdab8341d8c2351edb769a41b0c9c229c592dbfe14ff2
-
SHA512
7e5acbc50998ba6ff79ec9b401c192166b6385e0af44839adf93531226fe009accd1d9f02fa647d300042e2d39d92954795c73ae08ae367881f0b1fcbb77c545
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCAKr4GEn9TFyHEg+eGHX:7JZoQrbTFZY1iaCAU89TIHEg+eiX
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-