General
-
Target
ZRTFO_985729c4a77f2146cf65fe2c8c63222ba27ed1fc643e02cae53e0b64a075f622
-
Size
1.1MB
-
Sample
241119-k6dyfstaje
-
MD5
0511e8b455959b645352db03f79399bd
-
SHA1
ea826bb60d1079a68733c8d89be9a906cd7ec9bf
-
SHA256
985729c4a77f2146cf65fe2c8c63222ba27ed1fc643e02cae53e0b64a075f622
-
SHA512
8527a8b1f683b5bd833fea2ca423fb30edcbe0268f7b6b2452bd4e1a00a9c37e95c0495e18c741fdf95819b43961fd9e5f2738ab29de7d2cfc4374130bd636c6
-
SSDEEP
24576:ctb20pkaCqT5TBWgNQ7aXIpPMIAASf+TXvZx6A:FVg5tQ7aXUPMIBhT/z5
Static task
static1
Behavioral task
behavioral1
Sample
ZRTFO_985729c4a77f2146cf65fe2c8c63222ba27ed1fc643e02cae53e0b64a075f622.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ZRTFO_985729c4a77f2146cf65fe2c8c63222ba27ed1fc643e02cae53e0b64a075f622.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ZRTFO_985729c4a77f2146cf65fe2c8c63222ba27ed1fc643e02cae53e0b64a075f622
-
Size
1.1MB
-
MD5
0511e8b455959b645352db03f79399bd
-
SHA1
ea826bb60d1079a68733c8d89be9a906cd7ec9bf
-
SHA256
985729c4a77f2146cf65fe2c8c63222ba27ed1fc643e02cae53e0b64a075f622
-
SHA512
8527a8b1f683b5bd833fea2ca423fb30edcbe0268f7b6b2452bd4e1a00a9c37e95c0495e18c741fdf95819b43961fd9e5f2738ab29de7d2cfc4374130bd636c6
-
SSDEEP
24576:ctb20pkaCqT5TBWgNQ7aXIpPMIAASf+TXvZx6A:FVg5tQ7aXUPMIBhT/z5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-