General
-
Target
IMG_6307_1772.exe
-
Size
127KB
-
Sample
240509-qe5jzsbb81
-
MD5
77eaebee7e193ce33af8fa01ad1c78fd
-
SHA1
0c422374a85402e3ba9f3229e63e7cc724d0da68
-
SHA256
a84976f14f99881b8fa21a451ff2a8ee98fb6cc0cc3883db10a6e8526955d172
-
SHA512
3062b0c0e8017ec69261f61fea857ee81f6191ec4f28cd76bf19d1b35e5495b005364c5b409e16ae8584d13e9634783d412e1db4f46ee8b7f855a4ff912bde74
-
SSDEEP
1536:PeYrUlyM9uDwucXroUhA9sDNkd4lbbbbbbbbbbbbbbbbbbbbbbbbbKt3hGH:8cFwEUhAW6CH
Static task
static1
Behavioral task
behavioral1
Sample
IMG_6307_1772.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
IMG_6307_1772.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
AvydGQ8TIDH9 - Email To:
[email protected]
Extracted
xworm
5.0
94.156.65.181:5353
4EV9DEZhSiEuj72Q
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot5987023205:AAFlvwKv3zD3wQ2CQAewIB6uU95uBQ25ip0/sendMessage?chat_id=5202962680
Targets
-
-
Target
IMG_6307_1772.exe
-
Size
127KB
-
MD5
77eaebee7e193ce33af8fa01ad1c78fd
-
SHA1
0c422374a85402e3ba9f3229e63e7cc724d0da68
-
SHA256
a84976f14f99881b8fa21a451ff2a8ee98fb6cc0cc3883db10a6e8526955d172
-
SHA512
3062b0c0e8017ec69261f61fea857ee81f6191ec4f28cd76bf19d1b35e5495b005364c5b409e16ae8584d13e9634783d412e1db4f46ee8b7f855a4ff912bde74
-
SSDEEP
1536:PeYrUlyM9uDwucXroUhA9sDNkd4lbbbbbbbbbbbbbbbbbbbbbbbbbKt3hGH:8cFwEUhAW6CH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-