General
-
Target
fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31
-
Size
152KB
-
Sample
240512-byrd5sdb67
-
MD5
c7013dfcdeda020d9e90786e7b0ed0ad
-
SHA1
dae80a192e1acb80b6199d19b64eb19afc57d169
-
SHA256
fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31
-
SHA512
0c66a2490a4bdd5af62ca28ff3c84c22e5953f257d39b1de16ae0d3f0a4a22876b9f2e7f37beb51789849c23f06aa29439d1f756bad176a05a76040f0dd5316e
-
SSDEEP
3072:ovNRUMcuby5K1ZW09rITytApFUKjbob69D:oFRhV25II5pFVH86
Static task
static1
Behavioral task
behavioral1
Sample
fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/
Targets
-
-
Target
fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31
-
Size
152KB
-
MD5
c7013dfcdeda020d9e90786e7b0ed0ad
-
SHA1
dae80a192e1acb80b6199d19b64eb19afc57d169
-
SHA256
fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31
-
SHA512
0c66a2490a4bdd5af62ca28ff3c84c22e5953f257d39b1de16ae0d3f0a4a22876b9f2e7f37beb51789849c23f06aa29439d1f756bad176a05a76040f0dd5316e
-
SSDEEP
3072:ovNRUMcuby5K1ZW09rITytApFUKjbob69D:oFRhV25II5pFVH86
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-