General
-
Target
ca4f5accc0736c9c52e789f2886a9a59bfaf8bf262f20d3878fa13efd61c813d
-
Size
732KB
-
Sample
240509-bnl2nscg95
-
MD5
b54240fde75c9bb2eb53bfb084a2faef
-
SHA1
44d2dbdef065bfd57bf17ac77476ea3dd813ec42
-
SHA256
ca4f5accc0736c9c52e789f2886a9a59bfaf8bf262f20d3878fa13efd61c813d
-
SHA512
ab027a27ca903a101548146de27e258620cf100be718bfa6066079910486b77f7e62e5c912b6614ad75401552c5e00c06dcd013fe432fbd6fcba8bd63de27a32
-
SSDEEP
12288:aaQTvDn9COmhaMdrFBuYFKsQ5LuQt0rEs1L/5z5/uxZfuJHZsf+1eHhzlH8uS+6p:aaCvD9M1rFBfFAhv0nh5ly1ujNwhceGz
Static task
static1
Behavioral task
behavioral1
Sample
ghanaboi.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
ghanaboi.exe
-
Size
1.1MB
-
MD5
379aa8fa30e23db3020c74118d2e413a
-
SHA1
c958bf38eace61a6dbfd01c44bc2f9e873fd7483
-
SHA256
8cc809668c3d157bc21a6a61130f1249100029876cfe4295c5ef0ef1f738e6af
-
SHA512
69fabea1d3c08c268b6c4f923336cd4100c6c2a6d372aa941d35bd4fc3adcf17c36c4cd65b598e5b5ca5cb2ed497b7e19f89fca7ed4ccd3e5dc373a84dc918c6
-
SSDEEP
24576:dqDEvCTbMWu7rQYlBQcBiT6rprG8aaNT1upDaLI6kN3:dTvC/MTQYxsWR7aaNTyD8i
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-