General
-
Target
a875dd426f1b15376aa51698921ae9be.bin
-
Size
661KB
-
Sample
240425-cclr7sdc22
-
MD5
440e919ff237398948f2dece7307d7c1
-
SHA1
0aa6e877da33c52fc0a1b210e1fa11fda7c1e66e
-
SHA256
0d6a9032aa5cc7a2bca9031d137c77353f80a2f184369700b62fd614ba5518c5
-
SHA512
5c3a8c86b2005673c117235d9b0acadeab37e165e04c4d7fccbc5179ce51d422765f54a35c1d18571edef872dc6e108b84a9bad1cf8a7a10c17e3b04a0b42678
-
SSDEEP
12288:fxSgWqxK7FBPisDPC2fk805jThjnJXVPBCSSY/pFlDncjFYUOKsU+eot6a4A0oCC:8gWqCmsDPINlFjnJvCBWp7DnFUOcqtFH
Behavioral task
behavioral1
Sample
f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806.exe
-
Size
696KB
-
MD5
a875dd426f1b15376aa51698921ae9be
-
SHA1
f36bb04b6ccbfbb2a5de912bf970eaf247108eac
-
SHA256
f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806
-
SHA512
fa1d2a9b305d7856d1ef72c0b654583534b731a2be0bdac050e17a06c6d4c13c1e5a4dcae3551ea98809bd0ed32ff7ba8eca0f1a771a611371884cf68fe57be2
-
SSDEEP
12288:XsHzOUNUSB/o5LsI1uwajJ5yvv1l280AQ9Xe1J4OlDEiMsmwrdjxETEbCNP:GiUmSB/o5d1ubcv3XQt+JZlDEiGwdOEO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-