General
-
Target
7b9478937e9d635385759c04e273f802bd5fe8ff93d26fca91b26d85363e5cfc.rar
-
Size
649KB
-
Sample
240511-bx9t4adf9v
-
MD5
86761523233b88ca7164bd18f1b9ddd6
-
SHA1
6786a09e5afbb8f3e0ae1546a667d6c97d50a6b4
-
SHA256
7b9478937e9d635385759c04e273f802bd5fe8ff93d26fca91b26d85363e5cfc
-
SHA512
a210aff071992852d773920677974702ba728204cc31230348136f55b7e32a3ca69ba99adade35930d5199985afbde4bd1048f7d8fc2724e7a6139d046c05173
-
SSDEEP
12288:Xnb1yOS3FwMn71K1eqDWc6Z+xtZtJw0almaJ1nTBwrSWbOIQhuhb6WAildRl24:XRy732MBi3D5zz/7aTntwrSWiWBnRl24
Static task
static1
Behavioral task
behavioral1
Sample
PO-33423122765.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
PO-33423122765.exe
-
Size
1.3MB
-
MD5
bb078c83338aa40005dcc903e8d00842
-
SHA1
99516fbbfc72156970db12059d52a9d2f16aff5b
-
SHA256
0ae05a66eb5e6dd6fc26a59f27d48f3cd28ae6c1454082045a32aff02d87c854
-
SHA512
5b56402c626a92237d1e0a11e6c9034b1632fda921eb5c6fc0389b44e1f4c6eaa0318d0fa0ec2d5be8221c240d98d754bd275a9097f6bd592d3626af0d199e4e
-
SSDEEP
24576:y4lavt0LkLL9IMixoEgeadMxjIuN6RimoUayq9MmCS:lkwkn9IMHeadAjCCU1aPCS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Suspicious use of SetThreadContext
-