General
-
Target
9bdd05707e4fd1f94f121284d0417ca922393ee2df78477c0a0bd22d96348170
-
Size
1.3MB
-
Sample
240416-cdpkgsef59
-
MD5
6f7cd66986aaa4b2f670e94c727cb413
-
SHA1
169b715bf8c2655748d3a6c89cc0c40ac3ec4eed
-
SHA256
9bdd05707e4fd1f94f121284d0417ca922393ee2df78477c0a0bd22d96348170
-
SHA512
b7bb3e40e91e18de36b493febc2af81982d81096da3b05a74cbd2c9f760143fae519817ec407ce8d4ae070c95a04fe5a890f7b03f1ad03faed29e5aa9364f70f
-
SSDEEP
24576:vAHnh+eWsN3skA4RV1Hom2KXMmHaqrVdEcrr7/vNjrfIL5:Sh+ZkldoPK8Yaqr8eVQ
Static task
static1
Behavioral task
behavioral1
Sample
9bdd05707e4fd1f94f121284d0417ca922393ee2df78477c0a0bd22d96348170.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
9bdd05707e4fd1f94f121284d0417ca922393ee2df78477c0a0bd22d96348170
-
Size
1.3MB
-
MD5
6f7cd66986aaa4b2f670e94c727cb413
-
SHA1
169b715bf8c2655748d3a6c89cc0c40ac3ec4eed
-
SHA256
9bdd05707e4fd1f94f121284d0417ca922393ee2df78477c0a0bd22d96348170
-
SHA512
b7bb3e40e91e18de36b493febc2af81982d81096da3b05a74cbd2c9f760143fae519817ec407ce8d4ae070c95a04fe5a890f7b03f1ad03faed29e5aa9364f70f
-
SSDEEP
24576:vAHnh+eWsN3skA4RV1Hom2KXMmHaqrVdEcrr7/vNjrfIL5:Sh+ZkldoPK8Yaqr8eVQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-