General
-
Target
15b1b4c16747e1805bdd5502c6bc8b82e3d99247109b13202b6b687da69e7763
-
Size
1.1MB
-
Sample
240427-by2j4sgc57
-
MD5
69a4260e313b0bc12c9b70f058546a66
-
SHA1
c7d1b30cf7adc38c87bf78dfe7f1df299cebc0a4
-
SHA256
15b1b4c16747e1805bdd5502c6bc8b82e3d99247109b13202b6b687da69e7763
-
SHA512
2e0da6e6ebf8daded5dacd007a1d0f518af4fc720bdb32a635ee1f778f98608a2328b183f1ac9cd8d48b285e40a1a92d7c95d5f80b7b12cae073edb27e89cfd9
-
SSDEEP
24576:JqDEvCTbMWu7rQYlBQcBiT6rprG8afgM3Q+a0kW1HAj1TNF:JTvC/MTQYxsWR7afgW3u
Static task
static1
Behavioral task
behavioral1
Sample
15b1b4c16747e1805bdd5502c6bc8b82e3d99247109b13202b6b687da69e7763.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15b1b4c16747e1805bdd5502c6bc8b82e3d99247109b13202b6b687da69e7763.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
15b1b4c16747e1805bdd5502c6bc8b82e3d99247109b13202b6b687da69e7763
-
Size
1.1MB
-
MD5
69a4260e313b0bc12c9b70f058546a66
-
SHA1
c7d1b30cf7adc38c87bf78dfe7f1df299cebc0a4
-
SHA256
15b1b4c16747e1805bdd5502c6bc8b82e3d99247109b13202b6b687da69e7763
-
SHA512
2e0da6e6ebf8daded5dacd007a1d0f518af4fc720bdb32a635ee1f778f98608a2328b183f1ac9cd8d48b285e40a1a92d7c95d5f80b7b12cae073edb27e89cfd9
-
SSDEEP
24576:JqDEvCTbMWu7rQYlBQcBiT6rprG8afgM3Q+a0kW1HAj1TNF:JTvC/MTQYxsWR7afgW3u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-