General
-
Target
102c02a1c8b18891a74d4240cbc6673f2771de86a31c0927c21040676d8c5436
-
Size
1.1MB
-
Sample
240507-bjdvhaee38
-
MD5
2c8875f8ec188a3a1d0bb9ef4ff31af7
-
SHA1
12b009dceb42263b84f686a03553756c59b146a8
-
SHA256
102c02a1c8b18891a74d4240cbc6673f2771de86a31c0927c21040676d8c5436
-
SHA512
8f28a15486ef04a8f8a1143148ba1fe084527020c594246a65ef9d6d339b796f2973c954075b3f4a4325b98f475b1c6b534816502cd28a45c6aae19e9cc3f1a3
-
SSDEEP
24576:54lavt0LkLL9IMixoEgeaqiaMx5ZdELwWZxMq9MmCS:Ikwkn9IMHeaqiSiaPCS
Static task
static1
Behavioral task
behavioral1
Sample
102c02a1c8b18891a74d4240cbc6673f2771de86a31c0927c21040676d8c5436.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
102c02a1c8b18891a74d4240cbc6673f2771de86a31c0927c21040676d8c5436
-
Size
1.1MB
-
MD5
2c8875f8ec188a3a1d0bb9ef4ff31af7
-
SHA1
12b009dceb42263b84f686a03553756c59b146a8
-
SHA256
102c02a1c8b18891a74d4240cbc6673f2771de86a31c0927c21040676d8c5436
-
SHA512
8f28a15486ef04a8f8a1143148ba1fe084527020c594246a65ef9d6d339b796f2973c954075b3f4a4325b98f475b1c6b534816502cd28a45c6aae19e9cc3f1a3
-
SSDEEP
24576:54lavt0LkLL9IMixoEgeaqiaMx5ZdELwWZxMq9MmCS:Ikwkn9IMHeaqiSiaPCS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-