General
-
Target
0973451fe68a7369a35deceb49590179c0b8fd43f4fe93ea883eb2288ac8a19e
-
Size
880KB
-
Sample
240308-b35sbscg8x
-
MD5
cc366b9ef4bb580a22dbb2fe8af6eb7c
-
SHA1
fb1c284b2f2e972e04fcf2e59b6edc0c1d35a66c
-
SHA256
0973451fe68a7369a35deceb49590179c0b8fd43f4fe93ea883eb2288ac8a19e
-
SHA512
4747fb6f60042899b00130046d3efaf8f431ca933e5e99dbfa6d6a2646be97a33a6d050a8675adf61a89f886f728fd8ecf8d3b890f60ba282c469c3c60823b8f
-
SSDEEP
12288:gsoJXR0lPCb1VktfisDI8CriG78zjRE9zbkZNdVi/SZmiepyCsTCpOz:1WilPCbbktfi38Ki/NdVi/0epy7TCc
Static task
static1
Behavioral task
behavioral1
Sample
0973451fe68a7369a35deceb49590179c0b8fd43f4fe93ea883eb2288ac8a19e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0973451fe68a7369a35deceb49590179c0b8fd43f4fe93ea883eb2288ac8a19e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6702267392:AAEGQMO4HSIfF_pFHgvIRn8hL14PVGtfy9A/
Targets
-
-
Target
0973451fe68a7369a35deceb49590179c0b8fd43f4fe93ea883eb2288ac8a19e
-
Size
880KB
-
MD5
cc366b9ef4bb580a22dbb2fe8af6eb7c
-
SHA1
fb1c284b2f2e972e04fcf2e59b6edc0c1d35a66c
-
SHA256
0973451fe68a7369a35deceb49590179c0b8fd43f4fe93ea883eb2288ac8a19e
-
SHA512
4747fb6f60042899b00130046d3efaf8f431ca933e5e99dbfa6d6a2646be97a33a6d050a8675adf61a89f886f728fd8ecf8d3b890f60ba282c469c3c60823b8f
-
SSDEEP
12288:gsoJXR0lPCb1VktfisDI8CriG78zjRE9zbkZNdVi/SZmiepyCsTCpOz:1WilPCbbktfi38Ki/NdVi/0epy7TCc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-