General
-
Target
4195248b7f5abab63c7fe783554f913c.exe
-
Size
756KB
-
Sample
210721-q6ax9tgece
-
MD5
4195248b7f5abab63c7fe783554f913c
-
SHA1
1c2b9caa2c0b5a2439bb034b6dcd3d383df5c656
-
SHA256
284f84d96664f2cd87973b7251e93e4e6dd0f954ec5f043c9f95e5cbddeb6420
-
SHA512
a4c049569cfb2d40083c54d468394ba7205ce13e969e576680eb6763bf198df0f65fc03e2e3dba3e293499e648eecc29d5523cfed1c4d9440085a73f5f4e37e9
Static task
static1
Behavioral task
behavioral1
Sample
4195248b7f5abab63c7fe783554f913c.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
4195248b7f5abab63c7fe783554f913c.exe
Resource
win10v20210410
Malware Config
Extracted
warzonerat
sdafsdffssffs.ydns.eu:6703
Extracted
agenttesla
https://api.telegram.org/bot1846829589:AAHSsEDTKvDOQ17YrNRY5_FXv5z4mpfGRIc/sendDocument
Targets
-
-
Target
4195248b7f5abab63c7fe783554f913c.exe
-
Size
756KB
-
MD5
4195248b7f5abab63c7fe783554f913c
-
SHA1
1c2b9caa2c0b5a2439bb034b6dcd3d383df5c656
-
SHA256
284f84d96664f2cd87973b7251e93e4e6dd0f954ec5f043c9f95e5cbddeb6420
-
SHA512
a4c049569cfb2d40083c54d468394ba7205ce13e969e576680eb6763bf198df0f65fc03e2e3dba3e293499e648eecc29d5523cfed1c4d9440085a73f5f4e37e9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
AgentTesla Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-