General
-
Target
GIBI.exe
-
Size
930KB
-
Sample
221208-rsz24adc2v
-
MD5
f4669b8159d06fd545b1bcf07507ff54
-
SHA1
0544a42fc5d4b443a9e07b1ff24a65bfa309b7fd
-
SHA256
d24842b404e95766700c3f37cc0e6266beebd1533082ec7d4443ee61637a2002
-
SHA512
8887f432064ffe706959a53496bf0a182d8c52eab3c715bda31b2df346903e67818fe5400acd14c9a5888589324f1191c17b0515448a41bd8b463fd9c85aaed2
-
SSDEEP
24576:IHZFWD781RX1k6zTkaSci1PcBk3WDxwg5+R:l7831kmAFPcUW7e
Static task
static1
Behavioral task
behavioral1
Sample
GIBI.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GIBI.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocument
Targets
-
-
Target
GIBI.exe
-
Size
930KB
-
MD5
f4669b8159d06fd545b1bcf07507ff54
-
SHA1
0544a42fc5d4b443a9e07b1ff24a65bfa309b7fd
-
SHA256
d24842b404e95766700c3f37cc0e6266beebd1533082ec7d4443ee61637a2002
-
SHA512
8887f432064ffe706959a53496bf0a182d8c52eab3c715bda31b2df346903e67818fe5400acd14c9a5888589324f1191c17b0515448a41bd8b463fd9c85aaed2
-
SSDEEP
24576:IHZFWD781RX1k6zTkaSci1PcBk3WDxwg5+R:l7831kmAFPcUW7e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-