General
-
Target
a5e32bcd37ce09665d4e20f9f22b2d471d14c3ec6d38c24013328d14912c1e0b
-
Size
1.2MB
-
Sample
240510-cxq8esdf6t
-
MD5
990d7c5089827035267f238afb2347f3
-
SHA1
ceccc360f0a16dd2b4f8f32c0d24c65b203be907
-
SHA256
a5e32bcd37ce09665d4e20f9f22b2d471d14c3ec6d38c24013328d14912c1e0b
-
SHA512
07bd88e0e2abb100732393cc935806a19ce636931703d518eec1131c3156005268f42893b3432dcd63c12b2dbee587a65b112f212b2b401ae0880ae0d3b82732
-
SSDEEP
24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8ayPmAkKteOiNNE:mTvC/MTQYxsWR7ayxFiN
Static task
static1
Behavioral task
behavioral1
Sample
a5e32bcd37ce09665d4e20f9f22b2d471d14c3ec6d38c24013328d14912c1e0b.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
a5e32bcd37ce09665d4e20f9f22b2d471d14c3ec6d38c24013328d14912c1e0b
-
Size
1.2MB
-
MD5
990d7c5089827035267f238afb2347f3
-
SHA1
ceccc360f0a16dd2b4f8f32c0d24c65b203be907
-
SHA256
a5e32bcd37ce09665d4e20f9f22b2d471d14c3ec6d38c24013328d14912c1e0b
-
SHA512
07bd88e0e2abb100732393cc935806a19ce636931703d518eec1131c3156005268f42893b3432dcd63c12b2dbee587a65b112f212b2b401ae0880ae0d3b82732
-
SSDEEP
24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8ayPmAkKteOiNNE:mTvC/MTQYxsWR7ayxFiN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-