General
-
Target
2aaebe44a0a2a7f2512f13a45a979406.exe
-
Size
712KB
-
Sample
231023-ltcqashe88
-
MD5
2aaebe44a0a2a7f2512f13a45a979406
-
SHA1
99e62fad1ba7ade1e6048ed56ce5f54bd5651f68
-
SHA256
2596ebc0efcdc61bcedda6f54707f35e388a98cf2233d2a95ad3741535ce5838
-
SHA512
31d57eeb3283182ddbcd917a75879f95892eebae4e7b11fadbcc8df66ec14025e72a75c60f3601637e1499c00bda477e951d4e928ae34407a78ce7af623076c4
-
SSDEEP
12288:pMZCUMRgR/mZRM+Byvxmut4r0gfRT53+bI0K9zWQAL28zjry7fP/8:tgkZR5ymutCvfRT53gKxWQAa8zj2r8
Static task
static1
Behavioral task
behavioral1
Sample
2aaebe44a0a2a7f2512f13a45a979406.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2aaebe44a0a2a7f2512f13a45a979406.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://thedress.pk - Port:
21 - Username:
[email protected] - Password:
texas1234567890
Targets
-
-
Target
2aaebe44a0a2a7f2512f13a45a979406.exe
-
Size
712KB
-
MD5
2aaebe44a0a2a7f2512f13a45a979406
-
SHA1
99e62fad1ba7ade1e6048ed56ce5f54bd5651f68
-
SHA256
2596ebc0efcdc61bcedda6f54707f35e388a98cf2233d2a95ad3741535ce5838
-
SHA512
31d57eeb3283182ddbcd917a75879f95892eebae4e7b11fadbcc8df66ec14025e72a75c60f3601637e1499c00bda477e951d4e928ae34407a78ce7af623076c4
-
SSDEEP
12288:pMZCUMRgR/mZRM+Byvxmut4r0gfRT53+bI0K9zWQAL28zjry7fP/8:tgkZR5ymutCvfRT53gKxWQAa8zj2r8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-