General
-
Target
5be0ccfa2a798666d60144319d4d2ab437b31f87dbf62a3b656ec12ba6777bf5.rar
-
Size
648KB
-
Sample
240524-bqck1sgc52
-
MD5
7fa22f47f43f5f5f966a7487d87457f9
-
SHA1
2deefbbebd686979db281babf8dc4b4eed0226c9
-
SHA256
5be0ccfa2a798666d60144319d4d2ab437b31f87dbf62a3b656ec12ba6777bf5
-
SHA512
3966c3c9d2ba55c87842fcd00c6eba9f62c4cabb5566d38b62a23cdbaf4093c3396c452d23bbeef3f899c72cf044e5a60c37ef7f3c96d13a716760a822e8d109
-
SSDEEP
12288:4y3H4t6Go5b/iG+cfRTdRn4jjHtQWRZmWpt46cZ7lwDPUHgJ/C0sxZbkroce:4y+c3+mTdRIjtnLH67lwDPq8/CVZYLe
Static task
static1
Behavioral task
behavioral1
Sample
ordinul de cotatie.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6708321519:AAH9WPgZQN8mlLl2zn6ccUEu4DYMqGCeTcQ/
Targets
-
-
Target
ordinul de cotatie.exe
-
Size
670KB
-
MD5
ed3815b037a3f57bfc35bc4b6c97c3a4
-
SHA1
034cded1a5c78337d11a3b4a0f9b62c270b51862
-
SHA256
bf2117027a187100dc80baf714dac0341c8f18fdd5e562248c43685ac0ceca29
-
SHA512
35a733c79702faf74ffed972eb2e2aef139713a4306634c4f3adb9ca6f9667442af24113efb23e1289ab66d64f02ce56e2406d3df98a52806a63ae90321b11ca
-
SSDEEP
12288:e8EMgXHfAhdhdSsLjQ05GzUPCLDMtUNGQeLq06ShFVr1KFABkeXOaId:e8jgvAhXfQ05Gz3LDUmnAqYjfXXOaI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-