General
-
Target
843ff8ac34c1b4e283207e2ff2ba116036809d336e60f45b324c033f65f115dd.zip
-
Size
660KB
-
Sample
240424-bzlv2sdg41
-
MD5
1add4d49ab7b1afebaee069fef766285
-
SHA1
2a1f46fd73be32cd639d0e94d9e42257456c852f
-
SHA256
843ff8ac34c1b4e283207e2ff2ba116036809d336e60f45b324c033f65f115dd
-
SHA512
566fce861276646f8272f953c0ed40ab7980763ab31efe7a3275bd8c564bc5b21127d7b2376fb9d00f38bdddf3105d26834cce5831b71670c703e815fc969e1e
-
SSDEEP
12288:C0698R5BT3pp3F9trZky+gTcrH6pKesQnXe/JSahdE0MsmM1bxxEHE20CNQO:C0698RXv3FbGt1rapKnQX2JPhdE0GMXa
Behavioral task
behavioral1
Sample
Factura E24000319v00. SL.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
Factura E24000319v00. SL.exe
-
Size
696KB
-
MD5
a875dd426f1b15376aa51698921ae9be
-
SHA1
f36bb04b6ccbfbb2a5de912bf970eaf247108eac
-
SHA256
f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806
-
SHA512
fa1d2a9b305d7856d1ef72c0b654583534b731a2be0bdac050e17a06c6d4c13c1e5a4dcae3551ea98809bd0ed32ff7ba8eca0f1a771a611371884cf68fe57be2
-
SSDEEP
12288:XsHzOUNUSB/o5LsI1uwajJ5yvv1l280AQ9Xe1J4OlDEiMsmwrdjxETEbCNP:GiUmSB/o5d1ubcv3XQt+JZlDEiGwdOEO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
UPX dump on OEP (original entry point)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-