General
-
Target
PO JP3309-20231228003.exe
-
Size
1.3MB
-
Sample
240411-pnwsrsbe56
-
MD5
26d4481358be879c74a936ae21fd125e
-
SHA1
9b6fb5e4899a28ca77efd193a673ef4cf4d79cda
-
SHA256
334e2c89c9ee7b4522bbd263cc1fe59065d6a1a21919e11504158266bed762b8
-
SHA512
8f25d136919c4aa65b5c75d5ad406f98510e817901747ceef33c94f03c7fd0863d694949d2eb15608532c3d624f305cd224161cfb26da9592a2f25716fcd1861
-
SSDEEP
24576:wAHnh+eWsN3skA4RV1Hom2KXMmHabVCjdWh/gJNdXi6K5:nh+ZkldoPK8YabgpWBgJNdy
Static task
static1
Behavioral task
behavioral1
Sample
PO JP3309-20231228003.exe
Resource
win7-20240319-en
Malware Config
Targets
-
-
Target
PO JP3309-20231228003.exe
-
Size
1.3MB
-
MD5
26d4481358be879c74a936ae21fd125e
-
SHA1
9b6fb5e4899a28ca77efd193a673ef4cf4d79cda
-
SHA256
334e2c89c9ee7b4522bbd263cc1fe59065d6a1a21919e11504158266bed762b8
-
SHA512
8f25d136919c4aa65b5c75d5ad406f98510e817901747ceef33c94f03c7fd0863d694949d2eb15608532c3d624f305cd224161cfb26da9592a2f25716fcd1861
-
SSDEEP
24576:wAHnh+eWsN3skA4RV1Hom2KXMmHabVCjdWh/gJNdXi6K5:nh+ZkldoPK8YabgpWBgJNdy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-