General
-
Target
AFC Drawing for POMB Support Base.exe
-
Size
245KB
-
Sample
240506-h4af5sdb4s
-
MD5
eaa4063b22edbfb291c5d66acac6dfe3
-
SHA1
416ed8f73fb134cac9fecb3cb5dea409317ebf21
-
SHA256
5bc488bb19629699f5ef130f3bc37a5edf155dedb22220bfbfa49bf8bee45901
-
SHA512
64bb802d17433e4c4bbcb1bf76a353326b141fd2cfb55440e64dff3576e61d6029ed95844ddeb2dbcd29852439486c5c05b107aada6b613948efe423e43bfe9e
-
SSDEEP
3072:np6d0SCBM+0sr5h5gVBqHWniEHcsQh6WdNUhjVI8l+X1845b46DsFG+if:0H8512UfnUI1jtf
Static task
static1
Behavioral task
behavioral1
Sample
AFC Drawing for POMB Support Base.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AFC Drawing for POMB Support Base.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/
Targets
-
-
Target
AFC Drawing for POMB Support Base.exe
-
Size
245KB
-
MD5
eaa4063b22edbfb291c5d66acac6dfe3
-
SHA1
416ed8f73fb134cac9fecb3cb5dea409317ebf21
-
SHA256
5bc488bb19629699f5ef130f3bc37a5edf155dedb22220bfbfa49bf8bee45901
-
SHA512
64bb802d17433e4c4bbcb1bf76a353326b141fd2cfb55440e64dff3576e61d6029ed95844ddeb2dbcd29852439486c5c05b107aada6b613948efe423e43bfe9e
-
SSDEEP
3072:np6d0SCBM+0sr5h5gVBqHWniEHcsQh6WdNUhjVI8l+X1845b46DsFG+if:0H8512UfnUI1jtf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-