General
-
Target
8b595373f715ca3fdcfb46ad318afa8c3a0bce743c790d572d57787a986f5887.exe
-
Size
1.1MB
-
Sample
240509-l5dfzacc31
-
MD5
4bb4e01a5370b516309f202e9ae67065
-
SHA1
909b4e79ef64bfaaf00c670a329eddff2a013300
-
SHA256
8b595373f715ca3fdcfb46ad318afa8c3a0bce743c790d572d57787a986f5887
-
SHA512
70a5ea29b0b66c256abd2d92e6cccf4b14b56f14a92e49fa9e2e14075ee94c8c79d31d9be88310dea42f0f93ddd5d8efad0775af27f3e295605b65ff943f4673
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8a4Mf8XMZqXYEQAaSiKpjNQ:bTvC/MTQYxsWR7a4MEMZa/is
Static task
static1
Behavioral task
behavioral1
Sample
8b595373f715ca3fdcfb46ad318afa8c3a0bce743c790d572d57787a986f5887.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b595373f715ca3fdcfb46ad318afa8c3a0bce743c790d572d57787a986f5887.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.deeptrans.com.tr - Port:
587 - Username:
[email protected] - Password:
59ace821A
Targets
-
-
Target
8b595373f715ca3fdcfb46ad318afa8c3a0bce743c790d572d57787a986f5887.exe
-
Size
1.1MB
-
MD5
4bb4e01a5370b516309f202e9ae67065
-
SHA1
909b4e79ef64bfaaf00c670a329eddff2a013300
-
SHA256
8b595373f715ca3fdcfb46ad318afa8c3a0bce743c790d572d57787a986f5887
-
SHA512
70a5ea29b0b66c256abd2d92e6cccf4b14b56f14a92e49fa9e2e14075ee94c8c79d31d9be88310dea42f0f93ddd5d8efad0775af27f3e295605b65ff943f4673
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8a4Mf8XMZqXYEQAaSiKpjNQ:bTvC/MTQYxsWR7a4MEMZa/is
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-