General
-
Target
f0c749be6648b90acad7cd8320e6247736bc7a5b125f70b662a53743e65398a1
-
Size
817KB
-
Sample
231207-ca5gjagffp
-
MD5
b6265c16178513ae561fcb84a65684b1
-
SHA1
02853462fc297af7629985fa144d302cc0e15754
-
SHA256
f0c749be6648b90acad7cd8320e6247736bc7a5b125f70b662a53743e65398a1
-
SHA512
8dd4e2e760585c716ddb6e751841675737f9490b8ccffc551c6821091c3eba68d635078c79d2c115964e0fe65e22516e6a97faa2fe3d0fc1ee5f98a4256eb2e7
-
SSDEEP
24576:e34/up+pJGTzCC0ri9lu0U/XO35H0uJAQdrktbn:e38PJ4zqizYfO35HFJ9Bktb
Static task
static1
Behavioral task
behavioral1
Sample
f0c749be6648b90acad7cd8320e6247736bc7a5b125f70b662a53743e65398a1.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
f0c749be6648b90acad7cd8320e6247736bc7a5b125f70b662a53743e65398a1.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
Protocol: ftp- Host:
thedress.pk - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Extracted
agenttesla
Protocol: ftp- Host:
ftp://thedress.pk - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
f0c749be6648b90acad7cd8320e6247736bc7a5b125f70b662a53743e65398a1
-
Size
817KB
-
MD5
b6265c16178513ae561fcb84a65684b1
-
SHA1
02853462fc297af7629985fa144d302cc0e15754
-
SHA256
f0c749be6648b90acad7cd8320e6247736bc7a5b125f70b662a53743e65398a1
-
SHA512
8dd4e2e760585c716ddb6e751841675737f9490b8ccffc551c6821091c3eba68d635078c79d2c115964e0fe65e22516e6a97faa2fe3d0fc1ee5f98a4256eb2e7
-
SSDEEP
24576:e34/up+pJGTzCC0ri9lu0U/XO35H0uJAQdrktbn:e38PJ4zqizYfO35HFJ9Bktb
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-