General
-
Target
36cbb216a9737402f9dfa4f7e7528d89.exe
-
Size
504KB
-
Sample
210722-wpwh7y65qj
-
MD5
36cbb216a9737402f9dfa4f7e7528d89
-
SHA1
43c641a1b5df61fc9078f6c86f26205358de674c
-
SHA256
16439cb0cbdf7399d29d66620895e9d23874e303638c8cf016239b9bc54e8d5e
-
SHA512
43cab89876da34ee77d39524639962349aff4248620c0374d3b3fd15337bec8bb82f5c4532efb64ec000f2f1391fa2e94397dd7b13d59abf6fe1c0c0ea433de7
Static task
static1
Behavioral task
behavioral1
Sample
36cbb216a9737402f9dfa4f7e7528d89.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
36cbb216a9737402f9dfa4f7e7528d89.exe
Resource
win10v20210410
Malware Config
Extracted
warzonerat
ghjklhgteg.strangled.net:6703
Extracted
agenttesla
https://api.telegram.org/bot1846829589:AAHSsEDTKvDOQ17YrNRY5_FXv5z4mpfGRIc/sendDocument
Targets
-
-
Target
36cbb216a9737402f9dfa4f7e7528d89.exe
-
Size
504KB
-
MD5
36cbb216a9737402f9dfa4f7e7528d89
-
SHA1
43c641a1b5df61fc9078f6c86f26205358de674c
-
SHA256
16439cb0cbdf7399d29d66620895e9d23874e303638c8cf016239b9bc54e8d5e
-
SHA512
43cab89876da34ee77d39524639962349aff4248620c0374d3b3fd15337bec8bb82f5c4532efb64ec000f2f1391fa2e94397dd7b13d59abf6fe1c0c0ea433de7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
AgentTesla Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-