General
-
Target
fcf5119642d6dba6ea2429a77699ce3bbc307e53c84daeecc0dcf6cfae8faa44
-
Size
1.3MB
-
Sample
240505-bp56yadc64
-
MD5
0eff13744eec03612fc1ad49230b1843
-
SHA1
53e4ae0783d239e1e0ffb6c665ab744e7a6b316c
-
SHA256
fcf5119642d6dba6ea2429a77699ce3bbc307e53c84daeecc0dcf6cfae8faa44
-
SHA512
046bd33d33870779c5ed81286d62591f2d2e3cf2c202596f9fc2180c156d142ce0e44e310fa35d5bfe643561bae80f15c26ce1b0e26e317ae412b1786bdb7570
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXMmHajgx2GpDb4quyVdW5:Hh+ZkldoPK8YajgcGFb4quv
Static task
static1
Behavioral task
behavioral1
Sample
fcf5119642d6dba6ea2429a77699ce3bbc307e53c84daeecc0dcf6cfae8faa44.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
fcf5119642d6dba6ea2429a77699ce3bbc307e53c84daeecc0dcf6cfae8faa44
-
Size
1.3MB
-
MD5
0eff13744eec03612fc1ad49230b1843
-
SHA1
53e4ae0783d239e1e0ffb6c665ab744e7a6b316c
-
SHA256
fcf5119642d6dba6ea2429a77699ce3bbc307e53c84daeecc0dcf6cfae8faa44
-
SHA512
046bd33d33870779c5ed81286d62591f2d2e3cf2c202596f9fc2180c156d142ce0e44e310fa35d5bfe643561bae80f15c26ce1b0e26e317ae412b1786bdb7570
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXMmHajgx2GpDb4quyVdW5:Hh+ZkldoPK8YajgcGFb4quv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-