General
-
Target
ab3f0c321894430eed1ba65eca338a0471e18ba82cdd554084ed63f36ff91dce.exe
-
Size
2.3MB
-
Sample
240507-v9nl6sgf6s
-
MD5
b5b77f0c912f438cbc5142c42818fa29
-
SHA1
94b5df605f00d34581435e3ca10b47094e31c0ab
-
SHA256
ab3f0c321894430eed1ba65eca338a0471e18ba82cdd554084ed63f36ff91dce
-
SHA512
87a1fbb1b8187377997b219bf6b286102648ff913ab0d73c78c67bee443702e9824bc14e980a2d38e5ece9a1fccc6e134f5dfa6f2b9bd9604ccb0d140418424f
-
SSDEEP
49152:j1ZU7LqS9SUqiRCQqzDzKbQJRdUbXK2cBcDdPO++9vvGT1nkYE:joHqS9S1kVqzDzvRdLlCBPONvGZkL
Static task
static1
Behavioral task
behavioral1
Sample
ab3f0c321894430eed1ba65eca338a0471e18ba82cdd554084ed63f36ff91dce.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab3f0c321894430eed1ba65eca338a0471e18ba82cdd554084ed63f36ff91dce.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/
Targets
-
-
Target
ab3f0c321894430eed1ba65eca338a0471e18ba82cdd554084ed63f36ff91dce.exe
-
Size
2.3MB
-
MD5
b5b77f0c912f438cbc5142c42818fa29
-
SHA1
94b5df605f00d34581435e3ca10b47094e31c0ab
-
SHA256
ab3f0c321894430eed1ba65eca338a0471e18ba82cdd554084ed63f36ff91dce
-
SHA512
87a1fbb1b8187377997b219bf6b286102648ff913ab0d73c78c67bee443702e9824bc14e980a2d38e5ece9a1fccc6e134f5dfa6f2b9bd9604ccb0d140418424f
-
SSDEEP
49152:j1ZU7LqS9SUqiRCQqzDzKbQJRdUbXK2cBcDdPO++9vvGT1nkYE:joHqS9S1kVqzDzvRdLlCBPONvGZkL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-