General
-
Target
b1954d6c1f249601ce6c562f6258ab29.exe
-
Size
1.2MB
-
Sample
210723-qym6kqp4sj
-
MD5
b1954d6c1f249601ce6c562f6258ab29
-
SHA1
f14797cd7a1d5c93e0acaab9ae808447c7d49646
-
SHA256
f6b969be87ff04be7afa8ebb789d8867356700537c3ca7cc8f64d2a587c0c0d6
-
SHA512
d7621ea34a49d9c3ca1e3ddd542a8e2e7115408b5959dbfc0a0525a6ebe83d70a363f4cf8ce9bec40fc51462bd9b986e9e51825f379c0e915b42ce2f4114a579
Static task
static1
Behavioral task
behavioral1
Sample
b1954d6c1f249601ce6c562f6258ab29.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b1954d6c1f249601ce6c562f6258ab29.exe
Resource
win10v20210408
Malware Config
Extracted
warzonerat
ghjklhgteg.strangled.net:6703
Extracted
agenttesla
https://api.telegram.org/bot1846829589:AAHSsEDTKvDOQ17YrNRY5_FXv5z4mpfGRIc/sendDocument
Targets
-
-
Target
b1954d6c1f249601ce6c562f6258ab29.exe
-
Size
1.2MB
-
MD5
b1954d6c1f249601ce6c562f6258ab29
-
SHA1
f14797cd7a1d5c93e0acaab9ae808447c7d49646
-
SHA256
f6b969be87ff04be7afa8ebb789d8867356700537c3ca7cc8f64d2a587c0c0d6
-
SHA512
d7621ea34a49d9c3ca1e3ddd542a8e2e7115408b5959dbfc0a0525a6ebe83d70a363f4cf8ce9bec40fc51462bd9b986e9e51825f379c0e915b42ce2f4114a579
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
AgentTesla Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-