General
-
Target
QUOTATION#235878.exe
-
Size
893KB
-
Sample
230330-jd6bkabe55
-
MD5
87a0518430f27f497e7d311547c3cc49
-
SHA1
3105b3ed593ca26a4faaf253c8ad037a8adacf8e
-
SHA256
a7c284be487a9a722313747a9d976173d074e4463ededc53668cd925b7793147
-
SHA512
3102f443d1865bfb69cf204b067493861aaf40e4245fda3c1bfa987f29100eb75aee10f4f56cfe49eb9dd55b6f957a0c3a34ed96bc5803dbb76b622c7464a6f7
-
SSDEEP
12288:d+nA3fWDsZt6wlr0T4ytyFAGuNPeG9rHJRhip1qJv6nnjqKoea:AA3fWDsT6wl0ByJRG973CqZ6nnjqKoea
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION#235878.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
QUOTATION#235878.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.code-jet.com - Port:
21 - Username:
[email protected] - Password:
Xec[t)4]dk2D
Targets
-
-
Target
QUOTATION#235878.exe
-
Size
893KB
-
MD5
87a0518430f27f497e7d311547c3cc49
-
SHA1
3105b3ed593ca26a4faaf253c8ad037a8adacf8e
-
SHA256
a7c284be487a9a722313747a9d976173d074e4463ededc53668cd925b7793147
-
SHA512
3102f443d1865bfb69cf204b067493861aaf40e4245fda3c1bfa987f29100eb75aee10f4f56cfe49eb9dd55b6f957a0c3a34ed96bc5803dbb76b622c7464a6f7
-
SSDEEP
12288:d+nA3fWDsZt6wlr0T4ytyFAGuNPeG9rHJRhip1qJv6nnjqKoea:AA3fWDsT6wl0ByJRG973CqZ6nnjqKoea
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-