General
-
Target
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c
-
Size
435KB
-
Sample
231207-cz8kgsadg7
-
MD5
b881374bc4264f837660e1d82d81d19b
-
SHA1
5068bf4bbb30a983cabe7ffe937ce099f11c1588
-
SHA256
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c
-
SHA512
30b0e3f5f551d898c2ff2098f67a6190bc1958e9565c59e31e0f5af6528bff5b1492e583f8be9967494de9a5a547680081cfc062f978f6e2db3bb7b6c254e2b0
-
SSDEEP
12288:xu0KGq6Kc8S8tpWchUpSnB7itr4H444t:xuEjE7D9nB7i94H444t
Static task
static1
Behavioral task
behavioral1
Sample
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.atelierzolotas.gr - Port:
21 - Username:
[email protected] - Password:
alibaba.com
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.atelierzolotas.gr - Port:
21 - Username:
[email protected] - Password:
alibaba.com
Targets
-
-
Target
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c
-
Size
435KB
-
MD5
b881374bc4264f837660e1d82d81d19b
-
SHA1
5068bf4bbb30a983cabe7ffe937ce099f11c1588
-
SHA256
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c
-
SHA512
30b0e3f5f551d898c2ff2098f67a6190bc1958e9565c59e31e0f5af6528bff5b1492e583f8be9967494de9a5a547680081cfc062f978f6e2db3bb7b6c254e2b0
-
SSDEEP
12288:xu0KGq6Kc8S8tpWchUpSnB7itr4H444t:xuEjE7D9nB7i94H444t
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-