General
-
Target
ff28bc5da16feadf7f4a6f94ca684b84afafc3da4d62e8154c01d7070041ce74
-
Size
736KB
-
Sample
240514-bjzrzadf52
-
MD5
ee5bfa79dec689da7504296b4fe000cc
-
SHA1
28c87b4616e2b23edbae41ae30f4ef90cd35c1c5
-
SHA256
ff28bc5da16feadf7f4a6f94ca684b84afafc3da4d62e8154c01d7070041ce74
-
SHA512
78275e6683cd40ca1ac1ee7602270c2a8838f61dc5e6c8df576711a494e473bc2f7c09b7303847e0111cdf05eb682e8a73a202da54c4240752de51908d51d6ca
-
SSDEEP
12288:/wZynYJYKRbhM5ZmhClxkIXW4EqGIwaoBIaRggG17nWjpqaF5kLu49czxIjeS/bc:/RYJXRWrmh4xkIXbEqGIjoBrRgg6nWl5
Static task
static1
Behavioral task
behavioral1
Sample
Factura2205590821.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Factura2205590821.exe
-
Size
1.1MB
-
MD5
63b2c81131687e687e3e7f1c0deb12c8
-
SHA1
2465347106a89ada6ede41f6ee6f89f3979621a0
-
SHA256
a609b506672dd6a2da8bd25c0ae4d21688c2ed48c1c205366e6a8c3a323e6671
-
SHA512
20765196191da86142c415f54f948ab9ec84b2e24d991e81a185d6d5cc3ba77ed6ffa6655e8e927cac73d9ce30b55b1e21565701dbeec91a64fbd9f553cbc3e1
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHal2gcNWtf8QL4vd5:gh+ZkldoPK8Yal2pWtf7L4/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-