General
-
Target
39f92d713caf05bf9043db2649aea9d2df4bd03e139c09a8e68dfca21d545f4a.exe
-
Size
145KB
-
Sample
240508-qg73wsgf72
-
MD5
115b5aae8c9a24258d28bfb74f638ac8
-
SHA1
3265a76ab3e92e5d77336427f3d6892fcb0d9cf7
-
SHA256
39f92d713caf05bf9043db2649aea9d2df4bd03e139c09a8e68dfca21d545f4a
-
SHA512
2a8237a4b0f8dfcd6bce208a8b9a096f32edfe8de71ceb35e8bd842ffcc22dceae723c5270e766ab9f10f27e288344dd70d7f66b841cb828d21dcb313d8d058a
-
SSDEEP
1536:PezR1zewFnNK7GRvKVnnatIl6X0QnX3OON8UbBGk0:PI1zDFMQvynnatC6dW2h0
Static task
static1
Behavioral task
behavioral1
Sample
39f92d713caf05bf9043db2649aea9d2df4bd03e139c09a8e68dfca21d545f4a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
39f92d713caf05bf9043db2649aea9d2df4bd03e139c09a8e68dfca21d545f4a.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/
Targets
-
-
Target
39f92d713caf05bf9043db2649aea9d2df4bd03e139c09a8e68dfca21d545f4a.exe
-
Size
145KB
-
MD5
115b5aae8c9a24258d28bfb74f638ac8
-
SHA1
3265a76ab3e92e5d77336427f3d6892fcb0d9cf7
-
SHA256
39f92d713caf05bf9043db2649aea9d2df4bd03e139c09a8e68dfca21d545f4a
-
SHA512
2a8237a4b0f8dfcd6bce208a8b9a096f32edfe8de71ceb35e8bd842ffcc22dceae723c5270e766ab9f10f27e288344dd70d7f66b841cb828d21dcb313d8d058a
-
SSDEEP
1536:PezR1zewFnNK7GRvKVnnatIl6X0QnX3OON8UbBGk0:PI1zDFMQvynnatC6dW2h0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-