General
-
Target
21da6251b60bdd9a0fcc9c1728d7f63885afeb53185ccef2a96103f3dad144d4
-
Size
633KB
-
Sample
230505-wt691seb7w
-
MD5
407a4475933399d86b822c4ed5a6393b
-
SHA1
cd060492426d7e749bdfef67b9e75d5d02b6e0ff
-
SHA256
21da6251b60bdd9a0fcc9c1728d7f63885afeb53185ccef2a96103f3dad144d4
-
SHA512
504695b98caeb931222a835bc4892af6629dab294c1912bf847ff271935114f8732a69fd36f039b79dc0a9395001489887667e837b04fa9a74a80370ef4805da
-
SSDEEP
12288:LAwe5SgUJm2XTRRypuQ+WzbkBmP0WhBXz/byKT9x:+5SgcmyQkBcpljb5J
Static task
static1
Behavioral task
behavioral1
Sample
21da6251b60bdd9a0fcc9c1728d7f63885afeb53185ccef2a96103f3dad144d4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
21da6251b60bdd9a0fcc9c1728d7f63885afeb53185ccef2a96103f3dad144d4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1611551445:AAFDJ3yQMlB3zXJGib2_TFkq1jedBMj3GTw/sendDocument
Targets
-
-
Target
21da6251b60bdd9a0fcc9c1728d7f63885afeb53185ccef2a96103f3dad144d4
-
Size
633KB
-
MD5
407a4475933399d86b822c4ed5a6393b
-
SHA1
cd060492426d7e749bdfef67b9e75d5d02b6e0ff
-
SHA256
21da6251b60bdd9a0fcc9c1728d7f63885afeb53185ccef2a96103f3dad144d4
-
SHA512
504695b98caeb931222a835bc4892af6629dab294c1912bf847ff271935114f8732a69fd36f039b79dc0a9395001489887667e837b04fa9a74a80370ef4805da
-
SSDEEP
12288:LAwe5SgUJm2XTRRypuQ+WzbkBmP0WhBXz/byKT9x:+5SgcmyQkBcpljb5J
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-