General
-
Target
z18BankAccountDetails.exe
-
Size
690KB
-
Sample
240113-pswzbsadar
-
MD5
699e3affc886e4d354de82b9c2898c2b
-
SHA1
2a34f358155ceccdbf91d2412b8c7afe7ee33142
-
SHA256
715dd87ef7b32eca897087684aa5267e6284460b8bbb1a8f03e50ae1b0cacd85
-
SHA512
c3bcbec7d7a6f9c14e2070fc52bf128f1f1279ee2e956ac702416bc55022161dcd50f19d98e8f23bb0815c872d1898b6d7f7c3d3df4162eabaeda12598adc617
-
SSDEEP
12288:EewoIc00MTJp0UOWumdRsoWZkz4VW3NPny3SVGjyR+Hq9bU2Hslb76:JwoIc0hJp0UOMLsoaA5tkHUbU2Hy76
Static task
static1
Behavioral task
behavioral1
Sample
z18BankAccountDetails.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
z18BankAccountDetails.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6708836842:AAEOj4CFUrj7jFG71fhzDaJLgRXgsIceQ5A/
Targets
-
-
Target
z18BankAccountDetails.exe
-
Size
690KB
-
MD5
699e3affc886e4d354de82b9c2898c2b
-
SHA1
2a34f358155ceccdbf91d2412b8c7afe7ee33142
-
SHA256
715dd87ef7b32eca897087684aa5267e6284460b8bbb1a8f03e50ae1b0cacd85
-
SHA512
c3bcbec7d7a6f9c14e2070fc52bf128f1f1279ee2e956ac702416bc55022161dcd50f19d98e8f23bb0815c872d1898b6d7f7c3d3df4162eabaeda12598adc617
-
SSDEEP
12288:EewoIc00MTJp0UOWumdRsoWZkz4VW3NPny3SVGjyR+Hq9bU2Hslb76:JwoIc0hJp0UOMLsoaA5tkHUbU2Hy76
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-