General
-
Target
fb5651783aa30a4f97c6ab35821f4c5b62df5be300d389cbf22d39f796018c71
-
Size
1.3MB
-
Sample
240430-bq7fdsgf3w
-
MD5
c88c8853ba9b515a190f40e021e67d8d
-
SHA1
5122640fd3a15206061690c8c1b0b77c3e5e1554
-
SHA256
fb5651783aa30a4f97c6ab35821f4c5b62df5be300d389cbf22d39f796018c71
-
SHA512
5aba0898921e825d0dd75ef805b85c2f774abce162180fc65494e5fa099c39e06be789f3a757b8565c4b53663a330566cdbdaeee6dc966fb9bb0cace6bb39792
-
SSDEEP
24576:iAHnh+eWsN3skA4RV1Hom2KXMmHa1jLmBgFCWSOBpiuEgrR5:lh+ZkldoPK8Ya1bgOZh
Static task
static1
Behavioral task
behavioral1
Sample
fb5651783aa30a4f97c6ab35821f4c5b62df5be300d389cbf22d39f796018c71.exe
Resource
win7-20240419-en
Malware Config
Targets
-
-
Target
fb5651783aa30a4f97c6ab35821f4c5b62df5be300d389cbf22d39f796018c71
-
Size
1.3MB
-
MD5
c88c8853ba9b515a190f40e021e67d8d
-
SHA1
5122640fd3a15206061690c8c1b0b77c3e5e1554
-
SHA256
fb5651783aa30a4f97c6ab35821f4c5b62df5be300d389cbf22d39f796018c71
-
SHA512
5aba0898921e825d0dd75ef805b85c2f774abce162180fc65494e5fa099c39e06be789f3a757b8565c4b53663a330566cdbdaeee6dc966fb9bb0cace6bb39792
-
SSDEEP
24576:iAHnh+eWsN3skA4RV1Hom2KXMmHa1jLmBgFCWSOBpiuEgrR5:lh+ZkldoPK8Ya1bgOZh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-