General
-
Target
34f8317c88180f1c229d69b940838a794b80ea6dcbdf0082e01720177adb468a
-
Size
1.8MB
-
Sample
230214-xm6wcaeh3w
-
MD5
20f53a9142c57034486e53e5bd338fd3
-
SHA1
89320dfb38d2e1f197e11ba82345ac0892ee9f7f
-
SHA256
34f8317c88180f1c229d69b940838a794b80ea6dcbdf0082e01720177adb468a
-
SHA512
9ef13d212023aad4217827f35def6a2c137d41b2804c927d5ca24a6245d524cf77391d57eb24d9fc01ce70315ef017596c7fd57ebcae12c6d5f9d466ed09fc05
-
SSDEEP
24576:ga4DeDaAyXWZagcHPhSeTBIqq4xA1XrNiR9GQCj:ga4DeDapXwagcHvBAGr0
Static task
static1
Behavioral task
behavioral1
Sample
34f8317c88180f1c229d69b940838a794b80ea6dcbdf0082e01720177adb468a.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5479139811:AAFjvrIBMkhtgUmULA2dMcFBI3ifYLrXZAc/
Targets
-
-
Target
34f8317c88180f1c229d69b940838a794b80ea6dcbdf0082e01720177adb468a
-
Size
1.8MB
-
MD5
20f53a9142c57034486e53e5bd338fd3
-
SHA1
89320dfb38d2e1f197e11ba82345ac0892ee9f7f
-
SHA256
34f8317c88180f1c229d69b940838a794b80ea6dcbdf0082e01720177adb468a
-
SHA512
9ef13d212023aad4217827f35def6a2c137d41b2804c927d5ca24a6245d524cf77391d57eb24d9fc01ce70315ef017596c7fd57ebcae12c6d5f9d466ed09fc05
-
SSDEEP
24576:ga4DeDaAyXWZagcHPhSeTBIqq4xA1XrNiR9GQCj:ga4DeDapXwagcHvBAGr0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Modifies Windows Firewall
-
Sets DLL path for service in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-