General
-
Target
638772e0db2d9ff9f16d9f7e0898f0d0c667506fa2b7120b9b7d46b9c4812061
-
Size
912KB
-
Sample
240326-btlcbsea91
-
MD5
eaab63e5c73af2c13c5d18faa1dfc09f
-
SHA1
edd14b744c5d68efabb0fd4db11c030006818c36
-
SHA256
638772e0db2d9ff9f16d9f7e0898f0d0c667506fa2b7120b9b7d46b9c4812061
-
SHA512
d9d837559b311508de7d575fb05a9ef2331ae87683e1fe7545a5523b7871cec7745fba8834593c3ba2557e7fc9df06aa0e9350fe817fff5b91406b6736a8de6f
-
SSDEEP
12288:lsHzOUNUSB/o5LsI1uwajJ5yvv1l2e7QS3O1wEIprNHzq7g8IdSVe2JWjtKFBG:ciUmSB/o5d1ubcvHQI9VzqPXgtIBG
Behavioral task
behavioral1
Sample
638772e0db2d9ff9f16d9f7e0898f0d0c667506fa2b7120b9b7d46b9c4812061.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
638772e0db2d9ff9f16d9f7e0898f0d0c667506fa2b7120b9b7d46b9c4812061
-
Size
912KB
-
MD5
eaab63e5c73af2c13c5d18faa1dfc09f
-
SHA1
edd14b744c5d68efabb0fd4db11c030006818c36
-
SHA256
638772e0db2d9ff9f16d9f7e0898f0d0c667506fa2b7120b9b7d46b9c4812061
-
SHA512
d9d837559b311508de7d575fb05a9ef2331ae87683e1fe7545a5523b7871cec7745fba8834593c3ba2557e7fc9df06aa0e9350fe817fff5b91406b6736a8de6f
-
SSDEEP
12288:lsHzOUNUSB/o5LsI1uwajJ5yvv1l2e7QS3O1wEIprNHzq7g8IdSVe2JWjtKFBG:ciUmSB/o5d1ubcvHQI9VzqPXgtIBG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-