General
-
Target
02556219aeb4a8190af7483698602a3cbd1acfbb7c4204b9c363ae8b2bfabc4f
-
Size
689KB
-
Sample
240506-bgl34aeh55
-
MD5
f788cef662fc40497cf24927895583c1
-
SHA1
41becdb5cce68747892b5056117c97d00cf321c1
-
SHA256
02556219aeb4a8190af7483698602a3cbd1acfbb7c4204b9c363ae8b2bfabc4f
-
SHA512
8f987d7b1b234ca10bc2873dd81609026915a02359b32db08ff7b518b5e752db0c96748f76395e934e4cc692d75fd18e301778c52d48c1a204ff55b560a5789f
-
SSDEEP
12288:ZsHzOUNUSB/o5LsI1uwajJ5yvv1l2J1OqE4xNS77eWpafibNk:AiUmSB/o5d1ubcvC3JzS7RqibNk
Behavioral task
behavioral1
Sample
02556219aeb4a8190af7483698602a3cbd1acfbb7c4204b9c363ae8b2bfabc4f.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
02556219aeb4a8190af7483698602a3cbd1acfbb7c4204b9c363ae8b2bfabc4f
-
Size
689KB
-
MD5
f788cef662fc40497cf24927895583c1
-
SHA1
41becdb5cce68747892b5056117c97d00cf321c1
-
SHA256
02556219aeb4a8190af7483698602a3cbd1acfbb7c4204b9c363ae8b2bfabc4f
-
SHA512
8f987d7b1b234ca10bc2873dd81609026915a02359b32db08ff7b518b5e752db0c96748f76395e934e4cc692d75fd18e301778c52d48c1a204ff55b560a5789f
-
SSDEEP
12288:ZsHzOUNUSB/o5LsI1uwajJ5yvv1l2J1OqE4xNS77eWpafibNk:AiUmSB/o5d1ubcvC3JzS7RqibNk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-