General
-
Target
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd
-
Size
66KB
-
Sample
240505-e1jc4aaa48
-
MD5
a542749ade83d32b48a918ff93413e01
-
SHA1
690f8022323066694d9c82851273c6e39f8b90c9
-
SHA256
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd
-
SHA512
6e54087cff93209691f2e418346f6bcf03646f35f6805a6f3d754a47e4488fdfaa451978b96da719839231eef92e1db4942b59ad8c457472b078d94c9ce0ed55
-
SSDEEP
1536:ybJT7XskGBXK3wDu3Y6Uk9jg+rr6GbOsKpeQiQKWOtnoHeix:MsxBnDud7r6GiX8QiQ/OtDm
Static task
static1
Behavioral task
behavioral1
Sample
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/
Targets
-
-
Target
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd
-
Size
66KB
-
MD5
a542749ade83d32b48a918ff93413e01
-
SHA1
690f8022323066694d9c82851273c6e39f8b90c9
-
SHA256
cb566a6496bd16540e99f5549dba94a0840aefe1a2cc284822ab0eab6c5198dd
-
SHA512
6e54087cff93209691f2e418346f6bcf03646f35f6805a6f3d754a47e4488fdfaa451978b96da719839231eef92e1db4942b59ad8c457472b078d94c9ce0ed55
-
SSDEEP
1536:ybJT7XskGBXK3wDu3Y6Uk9jg+rr6GbOsKpeQiQKWOtnoHeix:MsxBnDud7r6GiX8QiQ/OtDm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-