General
-
Target
3d0ab865ff33e19b38320e946e9179a31d1f1748be40c986a5bb3c92111ba273
-
Size
715KB
-
Sample
240229-btkqssac84
-
MD5
ed2604068752b07fee25e0cf9a4a77d1
-
SHA1
8bdf39b2e81d997dcd45bf570d1bd11a288e0f71
-
SHA256
3d0ab865ff33e19b38320e946e9179a31d1f1748be40c986a5bb3c92111ba273
-
SHA512
fd2934332452a39a764febd11df1362cd91df9fdd95cf8fd109c4fa4a49184aed15444aafcb1724843a7bc92d3048099d11267cb42cb1b5e04ff40c702e57a56
-
SSDEEP
12288:pY7drh3XcN3AFjXM6i1LIIVf9KNz6lmetYz1C7ergdPMpfJxNITDAJFZOKvjc:pY9taLIfN2lDaz46zfP6AJPc
Static task
static1
Behavioral task
behavioral1
Sample
rock9980jjfur.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
rock9980jjfur.exe
-
Size
1.1MB
-
MD5
3a4cf3e0afc19c30d0192f8b5141d76d
-
SHA1
b2a966b36f800565ba82f827917310fb127a9969
-
SHA256
041a39cb5700e4016b93e3e42efd80d3042adf5ecd96e4aa8b25635dd87df221
-
SHA512
6fe562840c94d9321f29d510e197f9c7cf2da94fbb2f3b013a70eb0d8b7b35074076ee595f29f1fe20d22fb6cf14e8e9b65e53870b5929a8c18a1e92cee49588
-
SSDEEP
24576:atb20pkaCqT5TBWgNQ7agT6bTngAJOa6A:HVg5tQ7ag48AJN5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-