General
-
Target
c1319d88157c2783106d114383d0761bc244a7915cab12eba2a038b1ac2374cf
-
Size
1.1MB
-
Sample
240510-bsl78sdh67
-
MD5
f4413db5e32a8c73da7f8ec128ab49f5
-
SHA1
f0d94679437cd6ce675e42115aaac69b22639d4f
-
SHA256
c1319d88157c2783106d114383d0761bc244a7915cab12eba2a038b1ac2374cf
-
SHA512
d116d3c71303c2313dafffb5afb14ae91c275ecf361a71999f856b7fc5dfe26752d45182e0dbced34b90afb2dcec8f8fb16de9be1c423b7e515a95c1e8be5e4d
-
SSDEEP
24576:A4lavt0LkLL9IMixoEgeaYE3KQR4eqJtR7q9MmCS:3kwkn9IMHeaYE9R45HaPCS
Static task
static1
Behavioral task
behavioral1
Sample
c1319d88157c2783106d114383d0761bc244a7915cab12eba2a038b1ac2374cf.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c1319d88157c2783106d114383d0761bc244a7915cab12eba2a038b1ac2374cf.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
c1319d88157c2783106d114383d0761bc244a7915cab12eba2a038b1ac2374cf
-
Size
1.1MB
-
MD5
f4413db5e32a8c73da7f8ec128ab49f5
-
SHA1
f0d94679437cd6ce675e42115aaac69b22639d4f
-
SHA256
c1319d88157c2783106d114383d0761bc244a7915cab12eba2a038b1ac2374cf
-
SHA512
d116d3c71303c2313dafffb5afb14ae91c275ecf361a71999f856b7fc5dfe26752d45182e0dbced34b90afb2dcec8f8fb16de9be1c423b7e515a95c1e8be5e4d
-
SSDEEP
24576:A4lavt0LkLL9IMixoEgeaYE3KQR4eqJtR7q9MmCS:3kwkn9IMHeaYE9R45HaPCS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-