General
-
Target
726cd214c481a2d479a955e17b46ca6817ea14b30af2effd59e82d4ad32b7c45
-
Size
659KB
-
Sample
240426-bk9cssgf91
-
MD5
dfae6e795fb7d0437af14eddaef8f17e
-
SHA1
9f068f8f7acd96915df5210bfa72c6a13f8fc1b3
-
SHA256
726cd214c481a2d479a955e17b46ca6817ea14b30af2effd59e82d4ad32b7c45
-
SHA512
cb00748ae280cfd31a267514d286b26dc2d14370e343a428293ff23da52eaa83a56aa7a52363589d5244a85c16a42baf91c2e03878e44a5a827209cb3046479d
-
SSDEEP
12288:6Q9h0WxnRX/u/j2yt+jnrcArKW/paPNvD20qzYZHgjkzKqC5DZNCPlj2QVn9kVMJ:6Wq0Jyj2c+jnE1VlZcBdv+lj2QHk+6e
Behavioral task
behavioral1
Sample
N factura 24-2024068723.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
N factura 24-2024068723.exe
-
Size
694KB
-
MD5
edce040806b758f70011f54ffb65985c
-
SHA1
828ebe650830993ea4c2d6ae81913e73380aa16f
-
SHA256
489684ef7548f0cad3b675655551bbcd476d1b8fedc9411f797ed73ad820c82a
-
SHA512
842481c671c6ca37bc83131af972c7c8e2f5af27b6e43005d23a9ad49db0283ab814fb232d1e46172fe4d2e85fda38e1aa699182aeb4c752b1e88bb18bcfcfea
-
SSDEEP
12288:OsHzOUNUSB/o5LsI1uwajJ5yvv1l2WDGqzYjHglSHKqw5DRFC3lZ2QVL9kpMZWFi:xiUmSB/o5d1ubcv5CljY5hrUlZ2Q3ked
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-