General
-
Target
27e20f8330de69c244a6320a58aa950ea66a34cdecc9ac68f0ca23b82747a9da.exe
-
Size
1.1MB
-
Sample
240509-l2jtkseg78
-
MD5
5161246e60fbc17c2e85f3180a30c216
-
SHA1
a3fdb88f66f07f524cf6541d481761d7b69f5403
-
SHA256
27e20f8330de69c244a6320a58aa950ea66a34cdecc9ac68f0ca23b82747a9da
-
SHA512
b5895bc0e83332dc2cf177c7dcb49e34e7c6f7b4ac903615b39b6a07920a59db84924ae0b548de5c9da10115affe6c24ca9930435bdd4598620ede776f5789b3
-
SSDEEP
24576:k4lavt0LkLL9IMixoEgea6G9ISfDIJEZJYdurawq9MmCS:zkwkn9IMHea6G9gSZJYduPaPCS
Static task
static1
Behavioral task
behavioral1
Sample
27e20f8330de69c244a6320a58aa950ea66a34cdecc9ac68f0ca23b82747a9da.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
27e20f8330de69c244a6320a58aa950ea66a34cdecc9ac68f0ca23b82747a9da.exe
-
Size
1.1MB
-
MD5
5161246e60fbc17c2e85f3180a30c216
-
SHA1
a3fdb88f66f07f524cf6541d481761d7b69f5403
-
SHA256
27e20f8330de69c244a6320a58aa950ea66a34cdecc9ac68f0ca23b82747a9da
-
SHA512
b5895bc0e83332dc2cf177c7dcb49e34e7c6f7b4ac903615b39b6a07920a59db84924ae0b548de5c9da10115affe6c24ca9930435bdd4598620ede776f5789b3
-
SSDEEP
24576:k4lavt0LkLL9IMixoEgea6G9ISfDIJEZJYdurawq9MmCS:zkwkn9IMHea6G9gSZJYduPaPCS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-