General
-
Target
3a795afc5fc1b74df84201208881753243596f0dec3b5ebd7ced7c350705ccdb
-
Size
660KB
-
Sample
240510-cjcswacf4z
-
MD5
799bf9d121c0a2257917fe60258464fd
-
SHA1
36b77a64136463937dc3638ef385035fac0b6cca
-
SHA256
3a795afc5fc1b74df84201208881753243596f0dec3b5ebd7ced7c350705ccdb
-
SHA512
0e348d2a3084e6c7565c38a842fa6c5a8c0197144d40186afd64058dd7a1f1e794a85963d1b86eda4f84bf8e296901a152e2e80a7f4f92f345397346c115c0ba
-
SSDEEP
12288:jj1NdCWLNjPHUUPVoHmz1EzItKJW0186Ia1jW22Nn8AdVCDi4iX/:jDdtNzPV1oqKJ4hCjWRNntSi4iX/
Behavioral task
behavioral1
Sample
LPO.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
LPO.exe
-
Size
685KB
-
MD5
fbcef5c1f75e7bfe82c1e79333c298c4
-
SHA1
26452a8f6e82b129478fa85886c8b8e1c95b7abd
-
SHA256
2615de3ee09694dd7b8a639d0af2a46f79a4dbecf0d7ccd6d3df6aef797c3b8c
-
SHA512
e21a5d1c4f8ea6b897f9c481722205867eb2656bd649278e32a86732f6398068181c8a5ed2b124dc49b45e1ffc86b781411f28ac8b23c6cf4db561aee69c488d
-
SSDEEP
12288:2Xe9PPlowWX0t6mOQwg1Qd15CcYk0We1FA3PItKJW0X8SI+1ZW22NnmAdVMDi4i5:LhloDX0XOf40qKJG52ZWRNnrwi4iXp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-