General
-
Target
Spoof.zip
-
Size
1.2MB
-
Sample
231209-2vwgsscdc5
-
MD5
1451994a23af6ea29799b73ca8c1f191
-
SHA1
bc40dd76ef022abbc70ec8a3ef3b36e53275ef7b
-
SHA256
cc744204664bbe57a739b6dc9ea221a6480c7331677c208b05b451bccd31a102
-
SHA512
6d48ebe0c88473408060801b6486d27ac3b0de2e5718c8b461b27be7d79a247a665262a6bf96ffdea46014cf839c854c32858547e94e6191cbc6a3ed97116a66
-
SSDEEP
24576:dB6Z0uUuVFQQfQuJniceYLlo49bvhFiXDT+8SwOEwJzPuPapjmaHHfbmUVC:TSUuVFQ9cFpt9zhgi3wEJzmSpyanfqUc
Behavioral task
behavioral1
Sample
Spoof.zip
Resource
win11-20231129-en
Behavioral task
behavioral2
Sample
Spoof/Guna.UI2.dll
Resource
win11-20231129-en
Behavioral task
behavioral3
Sample
Spoof/WindowsFormsApp2.exe
Resource
win11-20231128-en
Behavioral task
behavioral4
Sample
Spoof/WindowsFormsApp2.exe.config
Resource
win11-20231128-en
Behavioral task
behavioral5
Sample
Spoof/WindowsFormsApp2.pdb
Resource
win11-20231128-en
Malware Config
Targets
-
-
Target
Spoof.zip
-
Size
1.2MB
-
MD5
1451994a23af6ea29799b73ca8c1f191
-
SHA1
bc40dd76ef022abbc70ec8a3ef3b36e53275ef7b
-
SHA256
cc744204664bbe57a739b6dc9ea221a6480c7331677c208b05b451bccd31a102
-
SHA512
6d48ebe0c88473408060801b6486d27ac3b0de2e5718c8b461b27be7d79a247a665262a6bf96ffdea46014cf839c854c32858547e94e6191cbc6a3ed97116a66
-
SSDEEP
24576:dB6Z0uUuVFQQfQuJniceYLlo49bvhFiXDT+8SwOEwJzPuPapjmaHHfbmUVC:TSUuVFQ9cFpt9zhgi3wEJzmSpyanfqUc
Score1/10 -
-
-
Target
Spoof/Guna.UI2.dll
-
Size
2.1MB
-
MD5
c19e9e6a4bc1b668d19505a0437e7f7e
-
SHA1
73be712aef4baa6e9dabfc237b5c039f62a847fa
-
SHA256
9ac8b65e5c13292a8e564187c1e7446adc4230228b669383bd7b07035ab99a82
-
SHA512
b6cd0af436459f35a97db2d928120c53d3691533b01e4f0e8b382f2bd81d9a9a2c57e5e2aa6ade9d6a1746d5c4b2ef6c88d3a0cf519424b34445d0d30aab61de
-
SSDEEP
49152:6QNztBO2+VN7N3HtnPhx70ZO4+CPXOn5PThDH2TBeHjvjiBckYf+Yh/FJ3:6Ahck2z
Score1/10 -
-
-
Target
Spoof/WindowsFormsApp2.exe
-
Size
498KB
-
MD5
077abb82b84ddc20f64c1fc01bd48b87
-
SHA1
69a7f39503ec50d9305344cb09f2ab1afd736f7b
-
SHA256
c7e2265f4e6bd4a1ed9dc47f04c213a893ecc799ad61e407320cfe928b317093
-
SHA512
38002751eaec363e9890ec398d3f6975bf84823fd98ceadbaeb540a3b1ae38e948be912316fb61b7253d4fbada6f8bc527e4072ff68baa20c12b661f3d517f68
-
SSDEEP
6144:fy64DBFSbj/fG2uGAKsGAKsGAKmGAK1ino4IL52GAK1ino4IL52GAK1ino4IL5:gFym2uGUGUG+GsnoQGsnoQGsno
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
-
-
Target
Spoof/WindowsFormsApp2.exe.config
-
Size
929B
-
MD5
2461fef5b61855125a31e3eeec83ea99
-
SHA1
e1c82f24d87e4ea79829f83cfb9b1b844df41613
-
SHA256
0d5a868ba40b717256b2b0d2d91b6771a2efe5e139079bcb7dd11d1039b3bc6d
-
SHA512
ba3eff240d48eb606043a9d5fd596289bfa600430508525768e928eba278319c35bf09dc4ad6579a7fd3ec8d2c5e18932d017db10696f64a034027909d227bc3
Score3/10 -
-
-
Target
Spoof/WindowsFormsApp2.pdb
-
Size
157KB
-
MD5
f025cf0fa18e2f7998906242788384ae
-
SHA1
fa9bff5f1045856fa9f30a1d7b8b3f06eee26a24
-
SHA256
b8cb1cb9d680aea4cfe96ccadeaf32de60aa5011d27da7065346b52d8c79b9e9
-
SHA512
4ae331800a1cdb58fa22027ab61e345152747cf3c6c4534bec85b25e49602fdbec2bd7b66a4bfcd1f5f0999fe12df0a07dde97a5fa15461fa3e212ddff1c2312
-
SSDEEP
3072:+pt7TdHHf17DDFfZfnxpe4YYURnNbjv9Bi9uaZUZtUxJJXQz6mlKzGXSAdDqUFtV:+m9nN/Di9uaZUUmlKzGXSAdQ9fZU7mlf
Score3/10 -