General
-
Target
2024-06-14_dd90b11f1be5fa2b5a917736df5f28a6_agent-tesla_allaple_blacknet_cobalt-strike_floxif_gandcrab_gh0st_hublo_inception_limerat_mailto_njrat_petya_rifdoor_sakula_scarhikn_trickbot_xiaoba_zloader
-
Size
13.4MB
-
Sample
240614-ktlsjatbne
-
MD5
dd90b11f1be5fa2b5a917736df5f28a6
-
SHA1
4dabc410bd3821bcbb396bd4fb53b2a50fb478a5
-
SHA256
5aaa80bc6f4bafdc40f59beda4af6c7075455733977153ac031c28e65307e2ef
-
SHA512
67e952b0203bdbe867385d73feb2f8da981d7d4718719bd62d39fdab9ac941fca4aff74eb95632cd00efb4c76d2969a75d02b93c0632bca37bbc8813b256486c
-
SSDEEP
196608:j4A0/BZo55gBE32hifcgw+dhSh+zVuU0XNb:j4A0/B/Bhjgw+dhHMJ
Behavioral task
behavioral1
Sample
2024-06-14_dd90b11f1be5fa2b5a917736df5f28a6_agent-tesla_allaple_blacknet_cobalt-strike_floxif_gandcr.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-14_dd90b11f1be5fa2b5a917736df5f28a6_agent-tesla_allaple_blacknet_cobalt-strike_floxif_gandcr.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
84.205.7.83:7167
Extracted
metasploit
metasploit_stager
35.182.213.89:443
Targets
-
-
Target
2024-06-14_dd90b11f1be5fa2b5a917736df5f28a6_agent-tesla_allaple_blacknet_cobalt-strike_floxif_gandcrab_gh0st_hublo_inception_limerat_mailto_njrat_petya_rifdoor_sakula_scarhikn_trickbot_xiaoba_zloader
-
Size
13.4MB
-
MD5
dd90b11f1be5fa2b5a917736df5f28a6
-
SHA1
4dabc410bd3821bcbb396bd4fb53b2a50fb478a5
-
SHA256
5aaa80bc6f4bafdc40f59beda4af6c7075455733977153ac031c28e65307e2ef
-
SHA512
67e952b0203bdbe867385d73feb2f8da981d7d4718719bd62d39fdab9ac941fca4aff74eb95632cd00efb4c76d2969a75d02b93c0632bca37bbc8813b256486c
-
SSDEEP
196608:j4A0/BZo55gBE32hifcgw+dhSh+zVuU0XNb:j4A0/B/Bhjgw+dhHMJ
Score1/10 -