General
-
Target
C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE
-
Size
1.2MB
-
Sample
250103-jqlspavmcx
-
MD5
5f23c17f4b0f1a42bfe463ee74a92ec9
-
SHA1
439fa7be32d52c871c737e4b2b97ad93305319e9
-
SHA256
c05a2d99f15bfc8dc10c8cceb84db95faece377ba0ad38ed882ecba59e1bdcae
-
SHA512
bc8f5e2c1a53afd026f3105811e3d4c0404dc466bfe2708e64e22ed14fb244475a269d292069808c02e00fab9a9eaffd03d86dbefcd35c5ea73e84739768cce3
-
SSDEEP
24576:vqDEvCTbMWu7rQYlBQcBiT6rprG8abNJLqSNwa1kCP8NUWg:vTvC/MTQYxsWR7abvl66m
Static task
static1
Behavioral task
behavioral1
Sample
C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE
-
Size
1.2MB
-
MD5
5f23c17f4b0f1a42bfe463ee74a92ec9
-
SHA1
439fa7be32d52c871c737e4b2b97ad93305319e9
-
SHA256
c05a2d99f15bfc8dc10c8cceb84db95faece377ba0ad38ed882ecba59e1bdcae
-
SHA512
bc8f5e2c1a53afd026f3105811e3d4c0404dc466bfe2708e64e22ed14fb244475a269d292069808c02e00fab9a9eaffd03d86dbefcd35c5ea73e84739768cce3
-
SSDEEP
24576:vqDEvCTbMWu7rQYlBQcBiT6rprG8abNJLqSNwa1kCP8NUWg:vTvC/MTQYxsWR7abvl66m
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-