General
-
Target
44020c86a10168041f6ddde52fd3f4d4.exe
-
Size
748KB
-
Sample
210719-zdbksb6vme
-
MD5
44020c86a10168041f6ddde52fd3f4d4
-
SHA1
0dc9cf42fb0b5670d54307c9eb41cbc43bd66454
-
SHA256
71d384c258d0d2cfbeeda66a1ba67085b347d934a3484e0df3fc06a684085386
-
SHA512
163de8e93558e30b09f6a89dd3be3627c9fbd076ba28001b19db0efc9e33bf6ed4b1ba62d63d29403af4c7c9108b92bcb9ea0aa0978023d3398a36534049683b
Static task
static1
Behavioral task
behavioral1
Sample
44020c86a10168041f6ddde52fd3f4d4.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
44020c86a10168041f6ddde52fd3f4d4.exe
Resource
win10v20210410
Malware Config
Extracted
warzonerat
sdafsdffssffs.ydns.eu:6703
Extracted
agenttesla
https://api.telegram.org/bot1846829589:AAHSsEDTKvDOQ17YrNRY5_FXv5z4mpfGRIc/sendDocument
Targets
-
-
Target
44020c86a10168041f6ddde52fd3f4d4.exe
-
Size
748KB
-
MD5
44020c86a10168041f6ddde52fd3f4d4
-
SHA1
0dc9cf42fb0b5670d54307c9eb41cbc43bd66454
-
SHA256
71d384c258d0d2cfbeeda66a1ba67085b347d934a3484e0df3fc06a684085386
-
SHA512
163de8e93558e30b09f6a89dd3be3627c9fbd076ba28001b19db0efc9e33bf6ed4b1ba62d63d29403af4c7c9108b92bcb9ea0aa0978023d3398a36534049683b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
AgentTesla Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-