General
-
Target
unzz.exe
-
Size
315KB
-
Sample
230210-zlfnwacc88
-
MD5
70a72d5298414f3d38bc10e694a858d9
-
SHA1
a15a8053add9243366f406145a25f21cd81bd4b2
-
SHA256
95bb664ebb57018a7c4e89ec8c9a78bc3aab2e580ac415a51e8416e292206afe
-
SHA512
b10801c6a316cef36baf5968ce02c046d50df2404cad74f2ed82524c011029a55d8d5edcb58931efa738c0cc49d036a3d4b1d26f029130f234cfdd374ea2a0bc
-
SSDEEP
6144:vYa6Bb6oGPEOuppH26oEMHaseG64X1uD1HWFJzJRNLuFHhLHq:vYLb6FsPR2YMHas9X1BzobK
Static task
static1
Behavioral task
behavioral1
Sample
unzz.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
unzz.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
unzz.exe
-
Size
315KB
-
MD5
70a72d5298414f3d38bc10e694a858d9
-
SHA1
a15a8053add9243366f406145a25f21cd81bd4b2
-
SHA256
95bb664ebb57018a7c4e89ec8c9a78bc3aab2e580ac415a51e8416e292206afe
-
SHA512
b10801c6a316cef36baf5968ce02c046d50df2404cad74f2ed82524c011029a55d8d5edcb58931efa738c0cc49d036a3d4b1d26f029130f234cfdd374ea2a0bc
-
SSDEEP
6144:vYa6Bb6oGPEOuppH26oEMHaseG64X1uD1HWFJzJRNLuFHhLHq:vYLb6FsPR2YMHas9X1BzobK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-