General
-
Target
57effe25b0694954debe861780a0dd92b8925dbf599129644e14c10344c1a1eb
-
Size
1.2MB
-
Sample
240506-bglgkabh5v
-
MD5
d4089829797177e6d008fcb4379ce1a0
-
SHA1
50286992343b8a628d879cddc53a6eb954436d42
-
SHA256
57effe25b0694954debe861780a0dd92b8925dbf599129644e14c10344c1a1eb
-
SHA512
f28af57f563e9340eef734895702bd95236c764b158c445b3a704e45b56b981eda16c0254b1647eaec290500096abb75940785cc591bbcab84d75373ce26e5ff
-
SSDEEP
24576:DAHnh+eWsN3skA4RV1Hom2KXMmHa22yAys4uZRbAgXKzibK5:Oh+ZkldoPK8Ya22yAypuZmgaziE
Static task
static1
Behavioral task
behavioral1
Sample
57effe25b0694954debe861780a0dd92b8925dbf599129644e14c10344c1a1eb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
57effe25b0694954debe861780a0dd92b8925dbf599129644e14c10344c1a1eb.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
57effe25b0694954debe861780a0dd92b8925dbf599129644e14c10344c1a1eb
-
Size
1.2MB
-
MD5
d4089829797177e6d008fcb4379ce1a0
-
SHA1
50286992343b8a628d879cddc53a6eb954436d42
-
SHA256
57effe25b0694954debe861780a0dd92b8925dbf599129644e14c10344c1a1eb
-
SHA512
f28af57f563e9340eef734895702bd95236c764b158c445b3a704e45b56b981eda16c0254b1647eaec290500096abb75940785cc591bbcab84d75373ce26e5ff
-
SSDEEP
24576:DAHnh+eWsN3skA4RV1Hom2KXMmHa22yAys4uZRbAgXKzibK5:Oh+ZkldoPK8Ya22yAypuZmgaziE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-