General
-
Target
28d2e9a575bc6c4db94ccd8fc97a03fb0cdd81d35b534ff62839714480a287cf.exe
-
Size
1.1MB
-
Sample
240509-l2lm6sca6x
-
MD5
af20c6856fed0486f9f97e4e7efc8b74
-
SHA1
236b0d66a2e71cd2024e0876ed39a4df5e7b630d
-
SHA256
28d2e9a575bc6c4db94ccd8fc97a03fb0cdd81d35b534ff62839714480a287cf
-
SHA512
f49765f2059eef1411ab2629cb5d6c617f3bab23299e043cc8769cb148d26ed3282821a767d64507fb113734bc165ffd78d1c78f71caa6399fe0bcbc6ca7a5c4
-
SSDEEP
24576:WqDEvCTbMWu7rQYlBQcBiT6rprG8au/4odiwBUgA16Ns:WTvC/MTQYxsWR7au/4odfUgx
Static task
static1
Behavioral task
behavioral1
Sample
28d2e9a575bc6c4db94ccd8fc97a03fb0cdd81d35b534ff62839714480a287cf.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
28d2e9a575bc6c4db94ccd8fc97a03fb0cdd81d35b534ff62839714480a287cf.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.deeptrans.com.tr - Port:
587 - Username:
[email protected] - Password:
59ace821A
Targets
-
-
Target
28d2e9a575bc6c4db94ccd8fc97a03fb0cdd81d35b534ff62839714480a287cf.exe
-
Size
1.1MB
-
MD5
af20c6856fed0486f9f97e4e7efc8b74
-
SHA1
236b0d66a2e71cd2024e0876ed39a4df5e7b630d
-
SHA256
28d2e9a575bc6c4db94ccd8fc97a03fb0cdd81d35b534ff62839714480a287cf
-
SHA512
f49765f2059eef1411ab2629cb5d6c617f3bab23299e043cc8769cb148d26ed3282821a767d64507fb113734bc165ffd78d1c78f71caa6399fe0bcbc6ca7a5c4
-
SSDEEP
24576:WqDEvCTbMWu7rQYlBQcBiT6rprG8au/4odiwBUgA16Ns:WTvC/MTQYxsWR7au/4odfUgx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-