General
-
Target
514433b53820eeae8c05a3e2c370b68cd9dfbaebd74faf1cb7a0c5f5eb12b2e9
-
Size
1.1MB
-
Sample
240512-byx7padb74
-
MD5
58e6e98b5e2f780b7f58d300f9db695f
-
SHA1
12afe23b1327c8c32067e6e10524cea1343f5492
-
SHA256
514433b53820eeae8c05a3e2c370b68cd9dfbaebd74faf1cb7a0c5f5eb12b2e9
-
SHA512
d363f0e70dd1423fbc59c974f631ea531275f439ea5c040cf9b49fc764ccd554c32cf17bba86e31946a5ef184663aa6fd32a3aed42591c5337a29b30d31518fc
-
SSDEEP
24576:q4lavt0LkLL9IMixoEgeanWYqAOl8+vblnNhq9MmCS:9kwkn9IMHeanWRq+jVbaPCS
Static task
static1
Behavioral task
behavioral1
Sample
514433b53820eeae8c05a3e2c370b68cd9dfbaebd74faf1cb7a0c5f5eb12b2e9.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
514433b53820eeae8c05a3e2c370b68cd9dfbaebd74faf1cb7a0c5f5eb12b2e9
-
Size
1.1MB
-
MD5
58e6e98b5e2f780b7f58d300f9db695f
-
SHA1
12afe23b1327c8c32067e6e10524cea1343f5492
-
SHA256
514433b53820eeae8c05a3e2c370b68cd9dfbaebd74faf1cb7a0c5f5eb12b2e9
-
SHA512
d363f0e70dd1423fbc59c974f631ea531275f439ea5c040cf9b49fc764ccd554c32cf17bba86e31946a5ef184663aa6fd32a3aed42591c5337a29b30d31518fc
-
SSDEEP
24576:q4lavt0LkLL9IMixoEgeanWYqAOl8+vblnNhq9MmCS:9kwkn9IMHeanWRq+jVbaPCS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-