General
-
Target
0b7c33fe389af74c03a86ac689246634f1d6c9c5d4d08fb96b0e62e430cf6c09
-
Size
152KB
-
Sample
240507-bjasvabf4x
-
MD5
0683f3d988b62bf30b159a523c459f0b
-
SHA1
93aed0b8d760c8eaa92fb8b2316254b38c9619bf
-
SHA256
0b7c33fe389af74c03a86ac689246634f1d6c9c5d4d08fb96b0e62e430cf6c09
-
SHA512
9645e7f840a76a0465f22009d82e2ab87ffd1a32035deec66452838c2fccfb6a00c671e0534587b96c989546bec3cc1029e48ecda2a6328fb8483d576406c61a
-
SSDEEP
3072:ovNRUMcuby5K1ZW09rITytApFUKjbob69/:oFRhV25II5pFVH8w
Static task
static1
Behavioral task
behavioral1
Sample
0b7c33fe389af74c03a86ac689246634f1d6c9c5d4d08fb96b0e62e430cf6c09.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0b7c33fe389af74c03a86ac689246634f1d6c9c5d4d08fb96b0e62e430cf6c09.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/
Targets
-
-
Target
0b7c33fe389af74c03a86ac689246634f1d6c9c5d4d08fb96b0e62e430cf6c09
-
Size
152KB
-
MD5
0683f3d988b62bf30b159a523c459f0b
-
SHA1
93aed0b8d760c8eaa92fb8b2316254b38c9619bf
-
SHA256
0b7c33fe389af74c03a86ac689246634f1d6c9c5d4d08fb96b0e62e430cf6c09
-
SHA512
9645e7f840a76a0465f22009d82e2ab87ffd1a32035deec66452838c2fccfb6a00c671e0534587b96c989546bec3cc1029e48ecda2a6328fb8483d576406c61a
-
SSDEEP
3072:ovNRUMcuby5K1ZW09rITytApFUKjbob69/:oFRhV25II5pFVH8w
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-