General
-
Target
c0f72ab29ef52bcaec56b606ebd53b6e19f8ea5d36a071e7985ba77f0ebd95b2
-
Size
245KB
-
Sample
240514-b3nttaef62
-
MD5
4e59411c1f579d35eaf5cb4582445d0b
-
SHA1
e0f726787f161090f05057dd26263b02c652fcee
-
SHA256
c0f72ab29ef52bcaec56b606ebd53b6e19f8ea5d36a071e7985ba77f0ebd95b2
-
SHA512
19dde11d4f1c2ac75e85fdda9e7eef24e89f73eacf9314adf5533f533a79ef45de856f08d04e580c42a5e29484a3eee2d77b69bd5592b08ee7a4a7be926ad065
-
SSDEEP
3072:np6d0SCBM+0sr5h5gVBqHWniEHcsQh6WdNUhjVI8l+X1845b46DsFG+if:0H8512UfnUI1jtf
Static task
static1
Behavioral task
behavioral1
Sample
c0f72ab29ef52bcaec56b606ebd53b6e19f8ea5d36a071e7985ba77f0ebd95b2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0f72ab29ef52bcaec56b606ebd53b6e19f8ea5d36a071e7985ba77f0ebd95b2.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/
Targets
-
-
Target
c0f72ab29ef52bcaec56b606ebd53b6e19f8ea5d36a071e7985ba77f0ebd95b2
-
Size
245KB
-
MD5
4e59411c1f579d35eaf5cb4582445d0b
-
SHA1
e0f726787f161090f05057dd26263b02c652fcee
-
SHA256
c0f72ab29ef52bcaec56b606ebd53b6e19f8ea5d36a071e7985ba77f0ebd95b2
-
SHA512
19dde11d4f1c2ac75e85fdda9e7eef24e89f73eacf9314adf5533f533a79ef45de856f08d04e580c42a5e29484a3eee2d77b69bd5592b08ee7a4a7be926ad065
-
SSDEEP
3072:np6d0SCBM+0sr5h5gVBqHWniEHcsQh6WdNUhjVI8l+X1845b46DsFG+if:0H8512UfnUI1jtf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-