General
-
Target
bfd456793f2e66ad7c9513b6852d9787c2d4225cf6df9496f92de7aeb1d8c9be
-
Size
1.2MB
-
Sample
240507-b7msbafh68
-
MD5
d57143c50cfb8e8aa90dbb366dd2e892
-
SHA1
fc61599ade5e76edf5b17493595f101a57882765
-
SHA256
bfd456793f2e66ad7c9513b6852d9787c2d4225cf6df9496f92de7aeb1d8c9be
-
SHA512
0e8c3ed03d606589a26637b2b288b1f3cd66dc010babdc02c72e61285b41da5f0089fc3dab065f60cdb25d9fb509c54479c06b29494e7edb6a75058a90716f36
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8ar0tpJ+FBXRA/FULge33kQ:KTvC/MTQYxsWR7armpJ+HhAFULgeE
Static task
static1
Behavioral task
behavioral1
Sample
bfd456793f2e66ad7c9513b6852d9787c2d4225cf6df9496f92de7aeb1d8c9be.exe
Resource
win7-20240419-en
Malware Config
Targets
-
-
Target
bfd456793f2e66ad7c9513b6852d9787c2d4225cf6df9496f92de7aeb1d8c9be
-
Size
1.2MB
-
MD5
d57143c50cfb8e8aa90dbb366dd2e892
-
SHA1
fc61599ade5e76edf5b17493595f101a57882765
-
SHA256
bfd456793f2e66ad7c9513b6852d9787c2d4225cf6df9496f92de7aeb1d8c9be
-
SHA512
0e8c3ed03d606589a26637b2b288b1f3cd66dc010babdc02c72e61285b41da5f0089fc3dab065f60cdb25d9fb509c54479c06b29494e7edb6a75058a90716f36
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8ar0tpJ+FBXRA/FULge33kQ:KTvC/MTQYxsWR7armpJ+HhAFULgeE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-