General
-
Target
https://www.mediafire.com/file/n9xwhfo3rb94q9d/Inquiry+for+Uzbekistan+Customers.tgz/file
-
Sample
231211-h651tsgddm
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/n9xwhfo3rb94q9d/Inquiry+for+Uzbekistan+Customers.tgz/file
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
https://www.mediafire.com/file/n9xwhfo3rb94q9d/Inquiry+for+Uzbekistan+Customers.tgz/file
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6467305343:AAEqGE6MxS8ftbjN6sd7EEip8g1xBpkmw7s/
Targets
-
-
Target
https://www.mediafire.com/file/n9xwhfo3rb94q9d/Inquiry+for+Uzbekistan+Customers.tgz/file
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-