General
-
Target
IBDETN.img
-
Size
504KB
-
Sample
240307-p2bprabc68
-
MD5
eb5696eb21168e82bf1c911a98ba679a
-
SHA1
762b4c4c68ee1be81274c0c2a7c2082274237b21
-
SHA256
f91922fbdfba9ebcb266bea40a7c8c82f2152a7924649c01d6ff716c5227945c
-
SHA512
95e554ce372035b128cdbaa7f4d8aaca46363e73f66550ff167bc7ff3fd5d9107f30463022ee3b9b7fad8d355712c5fc6b6ff4cd701e883bd00f58a21c4d5399
-
SSDEEP
12288:TzzFUmAvADG6q4d22EOOpZqi3R91gtyuRV/Sxd6n5s6MCdlIU:TPa8jQjqirO3RV/L/9E
Static task
static1
Behavioral task
behavioral1
Sample
IBDETN.iso
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
IBDETN.iso
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
out.iso
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
out.iso
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
IBDETN.exe
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
IBDETN.exe
Resource
win11-20240221-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5870878058:AAEtYpDY1LBnBQGwZvkWktoa3wzKq0kSk78/
Targets
-
-
Target
IBDETN.img
-
Size
504KB
-
MD5
eb5696eb21168e82bf1c911a98ba679a
-
SHA1
762b4c4c68ee1be81274c0c2a7c2082274237b21
-
SHA256
f91922fbdfba9ebcb266bea40a7c8c82f2152a7924649c01d6ff716c5227945c
-
SHA512
95e554ce372035b128cdbaa7f4d8aaca46363e73f66550ff167bc7ff3fd5d9107f30463022ee3b9b7fad8d355712c5fc6b6ff4cd701e883bd00f58a21c4d5399
-
SSDEEP
12288:TzzFUmAvADG6q4d22EOOpZqi3R91gtyuRV/Sxd6n5s6MCdlIU:TPa8jQjqirO3RV/L/9E
Score3/10 -
-
-
Target
out.iso
-
Size
504KB
-
MD5
eb5696eb21168e82bf1c911a98ba679a
-
SHA1
762b4c4c68ee1be81274c0c2a7c2082274237b21
-
SHA256
f91922fbdfba9ebcb266bea40a7c8c82f2152a7924649c01d6ff716c5227945c
-
SHA512
95e554ce372035b128cdbaa7f4d8aaca46363e73f66550ff167bc7ff3fd5d9107f30463022ee3b9b7fad8d355712c5fc6b6ff4cd701e883bd00f58a21c4d5399
-
SSDEEP
12288:TzzFUmAvADG6q4d22EOOpZqi3R91gtyuRV/Sxd6n5s6MCdlIU:TPa8jQjqirO3RV/L/9E
Score1/10 -
-
-
Target
IBDETN.exe
-
Size
454KB
-
MD5
8471b9db1214920fdd671b1dcc918ecb
-
SHA1
ae3797cd019f52e1ded3d570bc25d2971919dbeb
-
SHA256
cb0c15dced352f0d8bec7ea8e3c2cd0488260c84dc73843d4929b43deb6fced0
-
SHA512
fad69abbc0142c0fb6d553a55c3119d795d9c1e12c484de963947e6db45fa4a2a09b966ded452ad02a0307988443df54cd54c6c38325436ffbd30342a62a7c1d
-
SSDEEP
12288:9zzFUmAvADG6q4d22EOOpZqi3R91gtyuRV/Sxd6n5s6MCdlIU:9Pa8jQjqirO3RV/L/9E
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-