General
-
Target
7bba7ec625c3ce82e3289cd23ce5f2f9e5e69ede14142cdb3f524d8ffed4c805
-
Size
2.2MB
-
Sample
240507-bwgrxsfc28
-
MD5
bc0f2ae3417f84681f180d0486eaf89d
-
SHA1
4c70ddf488fc8a2643295827c904086587c696a8
-
SHA256
7bba7ec625c3ce82e3289cd23ce5f2f9e5e69ede14142cdb3f524d8ffed4c805
-
SHA512
915a9005eac810574aca4d915683d6bb30658bff6a56476c7bd204564ebaf896e2591f5be935e94e0890460005abad2bc78d4dc02c1b9d29972904e43480525c
-
SSDEEP
49152:06InL8TQ7kSXDSNzwQgfirlPIgWGfVLraISi9dQvVAgTxbvJ1JEN7k:06InaeHXmNz9g6xQgPVLe7BLRVENI
Static task
static1
Behavioral task
behavioral1
Sample
frndYingwabenz.exe
Resource
win7-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sturmsgroup.com - Port:
587 - Username:
[email protected] - Password:
$(bQkIn8%O#z)bWw - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.sturmsgroup.com - Port:
587 - Username:
[email protected] - Password:
$(bQkIn8%O#z)bWw
Targets
-
-
Target
frndYingwabenz.exe
-
Size
2.3MB
-
MD5
134d09409208cf2631eea82d7cf985a8
-
SHA1
9b580e7fbbbfe30146688799ba82a76296387728
-
SHA256
2ee45b698151d921c58fa20ee6f839d5a4abe2ff3a8f8ee642c05e6dac8980bd
-
SHA512
410d84e85bfa495764b5a0239628424e44ded9dff561e394ab3cb37bea11ead1c67ebbc35a5122d9b677abeb091583561ea7e799eba8a0c1b665f6c54aae7b16
-
SSDEEP
49152:zDLOGtL+Tg7yUpDGZzwqgfkrHL8g2GfdLraO8iDlQv3KwvXbzJ1dkN7O:zHOGtsOVpKZzjgcrogvdLehnp3RkN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-