General
-
Target
45d4b0a1c89a7192b5a3de30e1568200d33941e8bc6b983c6bf5fe525fe83761
-
Size
1.1MB
-
Sample
240509-bm924scg74
-
MD5
9bd9899dfed52791f2ad4ea21194b016
-
SHA1
7c6165cd84aa9d848869f31491be10c4bcabafb6
-
SHA256
45d4b0a1c89a7192b5a3de30e1568200d33941e8bc6b983c6bf5fe525fe83761
-
SHA512
edcad9fc0eb993c95cce3c5a9a1692f87972a4ede0e61aef164a2464c022930c515783751a3a2722be4e9b473a4f60246d171432d49a9b5a620b4c22eefc3346
-
SSDEEP
24576:lAHnh+eWsN3skA4RV1Hom2KXMmHaco5m0JXfz1IZY3ub5:Uh+ZkldoPK8Yaco5HBA4e
Static task
static1
Behavioral task
behavioral1
Sample
45d4b0a1c89a7192b5a3de30e1568200d33941e8bc6b983c6bf5fe525fe83761.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
45d4b0a1c89a7192b5a3de30e1568200d33941e8bc6b983c6bf5fe525fe83761
-
Size
1.1MB
-
MD5
9bd9899dfed52791f2ad4ea21194b016
-
SHA1
7c6165cd84aa9d848869f31491be10c4bcabafb6
-
SHA256
45d4b0a1c89a7192b5a3de30e1568200d33941e8bc6b983c6bf5fe525fe83761
-
SHA512
edcad9fc0eb993c95cce3c5a9a1692f87972a4ede0e61aef164a2464c022930c515783751a3a2722be4e9b473a4f60246d171432d49a9b5a620b4c22eefc3346
-
SSDEEP
24576:lAHnh+eWsN3skA4RV1Hom2KXMmHaco5m0JXfz1IZY3ub5:Uh+ZkldoPK8Yaco5HBA4e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-