General
-
Target
3eca8ef9694a2869cfd991134e23b42294f671c0b4690ec851fa1a1ea8d5e117
-
Size
1.2MB
-
Sample
231207-czxszsghcn
-
MD5
2b3afc0b1c84c9cc4ad695b16df0385e
-
SHA1
a37738b0cbb97f1ffcc32bb19a4c67e788767023
-
SHA256
3eca8ef9694a2869cfd991134e23b42294f671c0b4690ec851fa1a1ea8d5e117
-
SHA512
a154a49c890b362fef97276e3a4e422985e2d95134423f04e9929badd538b680c673d18bc6907eb721e1039042eb3675008cf10e4bcd34f62a892b5c8c4ffb96
-
SSDEEP
12288:Nu0KGq6Kc8S8tpWchUpSnB7itr4H444t:NuEjE7D9nB7i94H444t
Static task
static1
Behavioral task
behavioral1
Sample
Our Order & RFQ 6632311.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Our Order & RFQ 6632311.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.atelierzolotas.gr - Port:
21 - Username:
[email protected] - Password:
alibaba.com
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.atelierzolotas.gr - Port:
21 - Username:
[email protected] - Password:
alibaba.com
Targets
-
-
Target
Our Order & RFQ 6632311.exe
-
Size
435KB
-
MD5
b881374bc4264f837660e1d82d81d19b
-
SHA1
5068bf4bbb30a983cabe7ffe937ce099f11c1588
-
SHA256
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c
-
SHA512
30b0e3f5f551d898c2ff2098f67a6190bc1958e9565c59e31e0f5af6528bff5b1492e583f8be9967494de9a5a547680081cfc062f978f6e2db3bb7b6c254e2b0
-
SSDEEP
12288:xu0KGq6Kc8S8tpWchUpSnB7itr4H444t:xuEjE7D9nB7i94H444t
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-