General
-
Target
7f3495645a47fbe0aed3b69518af96c3.bin
-
Size
737KB
-
Sample
240428-bvpq5sda59
-
MD5
7164480bd40b37bf1e87e100470186ae
-
SHA1
c693869841b52b45096adff1a06273a87412c1f2
-
SHA256
a5445bd367ce5e4ca445e7431d657e33d1bbe7617f296648bbb28c3c1cb24fb8
-
SHA512
cdafc1f4a9878c45c288dd8320c6625f2f7a1775fee7dc52c20b1b0c844059af1417745183961e73e172754adbf6fb1a66eb4b6487eefd1696d29f2af1cd84d7
-
SSDEEP
12288:2tGuuo4xZcIQGjWPQKtHoD0T8JBZo6BJGBpTBp5nsTRWLW03Lj3oRBRtpXev:+n4xbtaoWIDOYZvJEBpSkz/3orpuv
Static task
static1
Behavioral task
behavioral1
Sample
ebf3c83dc7467d503cf0ad20f47b4042dbefb543eae593e605a17cec9e8f3953.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ebf3c83dc7467d503cf0ad20f47b4042dbefb543eae593e605a17cec9e8f3953.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
ebf3c83dc7467d503cf0ad20f47b4042dbefb543eae593e605a17cec9e8f3953.exe
-
Size
1.2MB
-
MD5
7f3495645a47fbe0aed3b69518af96c3
-
SHA1
91a01966c9007daed292e9a7fcacc29cac90abe9
-
SHA256
ebf3c83dc7467d503cf0ad20f47b4042dbefb543eae593e605a17cec9e8f3953
-
SHA512
78ba7f692c8d207a8e9685c83d06fd25fd3e6297ed757ffa15e4ee68fa852bdb802fdf1a680b58512c32755356a3ef961c5e8bcec986a8099df8f172b96e240b
-
SSDEEP
24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8aOuLpHmBzFFM1ONQ9:LTvC/MTQYxsWR7aOuezPXy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-