General
-
Target
0766dcf703dbf0243d873fff3b325054eee96ce58a9753ac8aa9891c311b4434
-
Size
1.2MB
-
Sample
240424-b3ldpadg9w
-
MD5
52e4f8ee79c595a890bc451dfbbbb9f4
-
SHA1
12b24cc207161c893d5c87fc12453c083275d11f
-
SHA256
0766dcf703dbf0243d873fff3b325054eee96ce58a9753ac8aa9891c311b4434
-
SHA512
b10bad66f74786fef8e514c807700127e5518f3b64f14c6f05585f65bf01da7e0ff38de338e88ff1d5698e7c7a4c6f60a3294066ce7ea0d7b8a2881a67e3fcea
-
SSDEEP
24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8alPCJcAwNhy:sTvC/MTQYxsWR7alPC6B
Static task
static1
Behavioral task
behavioral1
Sample
0766dcf703dbf0243d873fff3b325054eee96ce58a9753ac8aa9891c311b4434.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0766dcf703dbf0243d873fff3b325054eee96ce58a9753ac8aa9891c311b4434.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
0766dcf703dbf0243d873fff3b325054eee96ce58a9753ac8aa9891c311b4434
-
Size
1.2MB
-
MD5
52e4f8ee79c595a890bc451dfbbbb9f4
-
SHA1
12b24cc207161c893d5c87fc12453c083275d11f
-
SHA256
0766dcf703dbf0243d873fff3b325054eee96ce58a9753ac8aa9891c311b4434
-
SHA512
b10bad66f74786fef8e514c807700127e5518f3b64f14c6f05585f65bf01da7e0ff38de338e88ff1d5698e7c7a4c6f60a3294066ce7ea0d7b8a2881a67e3fcea
-
SSDEEP
24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8alPCJcAwNhy:sTvC/MTQYxsWR7alPC6B
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-