General
-
Target
ba5dec80ddb7fb6cfc43338a8c6a490c03008bcf98fe0490cf4a47e9dbe378b6
-
Size
666KB
-
Sample
240427-b36dvsgd76
-
MD5
c1a3206c075a192e436e78faecb543d7
-
SHA1
9547e0dcabdce224f8204aa97d5dcb41d9ab59a0
-
SHA256
ba5dec80ddb7fb6cfc43338a8c6a490c03008bcf98fe0490cf4a47e9dbe378b6
-
SHA512
c014d8f09c6bdd799b3b17b5b57dcf6c7ca0df23747943ba67e07d09aaad0daa0c2836f618c55d7b161f8777fb6155c56e39e6bc7add0204396a5e88382a8865
-
SSDEEP
12288:1J8o7zzRTC/1uBnQexqxwwfS9GE0dFJl+LuQf0jlsmrTmXMi7MiteiyF3P6LCBNB:38szz0NuBzxOv24J8u3oX7M6gF3PCCEI
Behavioral task
behavioral1
Sample
N factura 24-2024068723.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
N factura 24-2024068723.exe
-
Size
702KB
-
MD5
73cf576f8b9052985b473488a5b4816a
-
SHA1
75aeec0ab7a8cd10e487df65a988d1b9b13475a3
-
SHA256
180896df7dc93c43d3da245c9f40c20f10902bc4d1a8b38386ec1ce185e71123
-
SHA512
d911fd9efb3611b450a646cb3979ba5f8ae682ce9e2e96296cdf4ecdbf5aa618d9094cd4c2312d961c507294e7e9e9bd4568c15ee1161c9e34409c1cc22e191d
-
SSDEEP
12288:msHzOUNUSB/o5LsI1uwajJ5yvv1l2RjmrLmxGi7qidkiKz3PeLk/NYZC6Nhe:JiUmSB/o5d1ubcvGxFqAmz3PmkGk6Nhe
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-