General
-
Target
ff686bc37f9a2d9ae4f242f7b6a891d9eb44ae373fb0e41a0d0826964fd826cb
-
Size
627KB
-
Sample
231208-bxd3esge67
-
MD5
15b2b360a1d3c5f7abd9e6563999ed6e
-
SHA1
4784b10ea4e6fe2d86c3e1e77707ebbce64ce388
-
SHA256
ff686bc37f9a2d9ae4f242f7b6a891d9eb44ae373fb0e41a0d0826964fd826cb
-
SHA512
34e2f36d859e588dac297d263ea93a1dbc3746c77f1a888bf43ec5e6dcd896017cccb79fb3ca19ec48c3cb780a534f958d8593bb6ef431cc3cdbddb268134117
-
SSDEEP
12288:quPNO9hUTQj2tZrmjCZzcbsI5DwH+K3NN01XqjV:NkrK9jSjCWYIg9qJq
Static task
static1
Behavioral task
behavioral1
Sample
ff686bc37f9a2d9ae4f242f7b6a891d9eb44ae373fb0e41a0d0826964fd826cb.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ff686bc37f9a2d9ae4f242f7b6a891d9eb44ae373fb0e41a0d0826964fd826cb.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://mercuresurabaya.com - Port:
21 - Username:
[email protected] - Password:
COM&qS[LeyKQ
Targets
-
-
Target
ff686bc37f9a2d9ae4f242f7b6a891d9eb44ae373fb0e41a0d0826964fd826cb
-
Size
627KB
-
MD5
15b2b360a1d3c5f7abd9e6563999ed6e
-
SHA1
4784b10ea4e6fe2d86c3e1e77707ebbce64ce388
-
SHA256
ff686bc37f9a2d9ae4f242f7b6a891d9eb44ae373fb0e41a0d0826964fd826cb
-
SHA512
34e2f36d859e588dac297d263ea93a1dbc3746c77f1a888bf43ec5e6dcd896017cccb79fb3ca19ec48c3cb780a534f958d8593bb6ef431cc3cdbddb268134117
-
SSDEEP
12288:quPNO9hUTQj2tZrmjCZzcbsI5DwH+K3NN01XqjV:NkrK9jSjCWYIg9qJq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-