General
-
Target
8114ae707d7630639e2dc0d5cfd5074d.bin
-
Size
662KB
-
Sample
240428-bvwjpada66
-
MD5
da5e3b7ae56a542496ec230cc0ced1b8
-
SHA1
5383b588222e6e5d8670458bb8752ebe38675fb5
-
SHA256
4c8e2d282a7f5e0c0f1142bfc9499fa39b7c6581d73b469e2e1a4569e9c6fc85
-
SHA512
473c574b9ee0dcfac6c4a5e9e162d0309b6a32d6e2a93ad78431a9db5b55c04414dae98e9decda4265f92f7ed915d17338b14b5f7d5645ac476e63c4dc469585
-
SSDEEP
12288:FoNvPK2ecvz0aCfrOOqPDuWJyORzEIdCqNj/aKQKwzBxZsXkNIcHz:SC2eeKOfPvyORz7dNNj/0Bn7NIcHz
Static task
static1
Behavioral task
behavioral1
Sample
PO 50018137-14.pdf.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
PO 50018137-14.pdf.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
PO 50018137-14.pdf.exe
-
Size
1.2MB
-
MD5
7f3495645a47fbe0aed3b69518af96c3
-
SHA1
91a01966c9007daed292e9a7fcacc29cac90abe9
-
SHA256
ebf3c83dc7467d503cf0ad20f47b4042dbefb543eae593e605a17cec9e8f3953
-
SHA512
78ba7f692c8d207a8e9685c83d06fd25fd3e6297ed757ffa15e4ee68fa852bdb802fdf1a680b58512c32755356a3ef961c5e8bcec986a8099df8f172b96e240b
-
SSDEEP
24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8aOuLpHmBzFFM1ONQ9:LTvC/MTQYxsWR7aOuezPXy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-