General
-
Target
9bbecc1749b4de47b175c20ddddd335e.exe
-
Size
1.2MB
-
Sample
210723-k33d5qewvx
-
MD5
9bbecc1749b4de47b175c20ddddd335e
-
SHA1
ee1512d73ce9375b7ee1c2fc4ffc5f994f4929ed
-
SHA256
0de691a91c2cce2b647aafa0fc5abdbfb84e2a91cda8ff93f4f85f2385007901
-
SHA512
3aa6002a7149a16a2c3eabed98c4bc65af5683853f231eeb8d70eba0452d9e2e79d76effd5101d1958491dc0498c0f10abc06c42ec02f03ef7792529c4669254
Static task
static1
Behavioral task
behavioral1
Sample
9bbecc1749b4de47b175c20ddddd335e.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
9bbecc1749b4de47b175c20ddddd335e.exe
Resource
win10v20210410
Malware Config
Extracted
warzonerat
ghjklhgteg.strangled.net:6703
Extracted
agenttesla
https://api.telegram.org/bot1846829589:AAHSsEDTKvDOQ17YrNRY5_FXv5z4mpfGRIc/sendDocument
Targets
-
-
Target
9bbecc1749b4de47b175c20ddddd335e.exe
-
Size
1.2MB
-
MD5
9bbecc1749b4de47b175c20ddddd335e
-
SHA1
ee1512d73ce9375b7ee1c2fc4ffc5f994f4929ed
-
SHA256
0de691a91c2cce2b647aafa0fc5abdbfb84e2a91cda8ff93f4f85f2385007901
-
SHA512
3aa6002a7149a16a2c3eabed98c4bc65af5683853f231eeb8d70eba0452d9e2e79d76effd5101d1958491dc0498c0f10abc06c42ec02f03ef7792529c4669254
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
AgentTesla Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-