General
-
Target
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd
-
Size
66KB
-
Sample
240505-bnanmsdb87
-
MD5
a542749ade83d32b48a918ff93413e01
-
SHA1
690f8022323066694d9c82851273c6e39f8b90c9
-
SHA256
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd
-
SHA512
6e54087cff93209691f2e418346f6bcf03646f35f6805a6f3d754a47e4488fdfaa451978b96da719839231eef92e1db4942b59ad8c457472b078d94c9ce0ed55
-
SSDEEP
1536:ybJT7XskGBXK3wDu3Y6Uk9jg+rr6GbOsKpeQiQKWOtnoHeix:MsxBnDud7r6GiX8QiQ/OtDm
Static task
static1
Behavioral task
behavioral1
Sample
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/
Targets
-
-
Target
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd
-
Size
66KB
-
MD5
a542749ade83d32b48a918ff93413e01
-
SHA1
690f8022323066694d9c82851273c6e39f8b90c9
-
SHA256
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd
-
SHA512
6e54087cff93209691f2e418346f6bcf03646f35f6805a6f3d754a47e4488fdfaa451978b96da719839231eef92e1db4942b59ad8c457472b078d94c9ce0ed55
-
SSDEEP
1536:ybJT7XskGBXK3wDu3Y6Uk9jg+rr6GbOsKpeQiQKWOtnoHeix:MsxBnDud7r6GiX8QiQ/OtDm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-