General
-
Target
SecuriteInfo.com.Win32.RATX-gen.14055.31447.exe.bin
-
Size
722KB
-
Sample
230501-yxxwvsac2x
-
MD5
4eb6592b14426d668a528688c0c615ac
-
SHA1
d9bc90927fd7b905aa565f0155acef13237cdce0
-
SHA256
6f661b49b6b38585c93365e01f17a50c585ac3ce7400f582c5c4541658cfe4f6
-
SHA512
c82795e88b3b34b54b26a58713b094fb2debd7e13c3689d1b101d57175761036dd3960758ff940a0fc3912effe465a309d52b95408ed11dd455cd1249f2615d2
-
SSDEEP
12288:AOaIsCGzr+7+kQa6W1yS5jjhckxXYqI4tk4fUlb/Xse2:TwW7+PxGt7ZJZK/Xse
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.RATX-gen.14055.31447.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.RATX-gen.14055.31447.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6198912739:AAFWwPOzcAOeh_bttxtGKKR_RIR4wgbcmQU/
Targets
-
-
Target
SecuriteInfo.com.Win32.RATX-gen.14055.31447.exe.bin
-
Size
722KB
-
MD5
4eb6592b14426d668a528688c0c615ac
-
SHA1
d9bc90927fd7b905aa565f0155acef13237cdce0
-
SHA256
6f661b49b6b38585c93365e01f17a50c585ac3ce7400f582c5c4541658cfe4f6
-
SHA512
c82795e88b3b34b54b26a58713b094fb2debd7e13c3689d1b101d57175761036dd3960758ff940a0fc3912effe465a309d52b95408ed11dd455cd1249f2615d2
-
SSDEEP
12288:AOaIsCGzr+7+kQa6W1yS5jjhckxXYqI4tk4fUlb/Xse2:TwW7+PxGt7ZJZK/Xse
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-