General
-
Target
52826106b0604a8fbe4da3ad9ebac57130933d40b1d3902888c5925b6386172c
-
Size
1.1MB
-
Sample
240313-c1rclaae4y
-
MD5
9ff1e54eaae2ffff004ac886a02e049b
-
SHA1
28756ecde5bf9ff9bb7bf78d76e490667190e390
-
SHA256
52826106b0604a8fbe4da3ad9ebac57130933d40b1d3902888c5925b6386172c
-
SHA512
924411198f22f21db97019a9de96eda7e6b699895adfb278d60335921ebe2761c9d698585af501a8614fefedd741fccb025f429ded66b78c2b3e959fc7a08969
-
SSDEEP
24576:CAHnh+eWsN3skA4RV1Hom2KXMmHaBPaaSZsnaeb5:Fh+ZkldoPK8YaBPaR1C
Static task
static1
Behavioral task
behavioral1
Sample
52826106b0604a8fbe4da3ad9ebac57130933d40b1d3902888c5925b6386172c.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
52826106b0604a8fbe4da3ad9ebac57130933d40b1d3902888c5925b6386172c
-
Size
1.1MB
-
MD5
9ff1e54eaae2ffff004ac886a02e049b
-
SHA1
28756ecde5bf9ff9bb7bf78d76e490667190e390
-
SHA256
52826106b0604a8fbe4da3ad9ebac57130933d40b1d3902888c5925b6386172c
-
SHA512
924411198f22f21db97019a9de96eda7e6b699895adfb278d60335921ebe2761c9d698585af501a8614fefedd741fccb025f429ded66b78c2b3e959fc7a08969
-
SSDEEP
24576:CAHnh+eWsN3skA4RV1Hom2KXMmHaBPaaSZsnaeb5:Fh+ZkldoPK8YaBPaR1C
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-