Behavioral task
behavioral1
Sample
6d1c16939dde45473304ac116392de082bd00b4477c322e7132b4efdd1dfcd59.exe
Resource
win7-20231215-en
General
-
Target
6d1c16939dde45473304ac116392de082bd00b4477c322e7132b4efdd1dfcd59
-
Size
305KB
-
MD5
e7846a0d2b87f46da113502d554d78ed
-
SHA1
3a69bb4ba5486079911d9dff7f60d429498712db
-
SHA256
6d1c16939dde45473304ac116392de082bd00b4477c322e7132b4efdd1dfcd59
-
SHA512
0731499bb4dd78483d5b5e91a6c29d81bb3c73ce5027afd13bcb4734241d56f7e42641db125162b670e1e4dcaff60584f2c294d5812d172b6a53b27b407c0c0d
-
SSDEEP
6144:GR44AnGydljJfqLtr007CQAdl9DEmIwrFM:GR44AnGyNf4L+dtXrFM
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6967409571:AAEKPTFrpT2oKct9fDAF6SN2r4di7xyeep4/
Signatures
-
Agenttesla family
-
Detect ZGRat V1 1 IoCs
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6d1c16939dde45473304ac116392de082bd00b4477c322e7132b4efdd1dfcd59
Files
-
6d1c16939dde45473304ac116392de082bd00b4477c322e7132b4efdd1dfcd59.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 302KB - Virtual size: 302KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ