General
-
Target
3f2af84e80e688ad910f1ff1cf39eba5575ef4f2c89e1e8aec5923f808836da6.rar
-
Size
657KB
-
Sample
240228-t4a88age3t
-
MD5
bc763018271c0f091616d977b6636d7a
-
SHA1
b04c6cf3b52ba3bd598857f95aca0687c65e2ab1
-
SHA256
3f2af84e80e688ad910f1ff1cf39eba5575ef4f2c89e1e8aec5923f808836da6
-
SHA512
754aa9d57ef049aeb5051bae666b1fc7d6a7d77ff1e18b811e4fe306d796884f296614e6e73fc99b710833e7bd5eed1ca53c259a012153e33a6f9856cefc94e2
-
SSDEEP
12288:yv0xESR/ZweolPji+GUZy2Z5f44qlxsBRF8ZMzs5q0atgLaPsLV:XCAhRsj44+ivOZM49+PsZ
Static task
static1
Behavioral task
behavioral1
Sample
Amended Order #60-23095847001XXX024.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Amended Order #60-23095847001XXX024.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.amtechprinting.com - Port:
21 - Username:
[email protected] - Password:
7DIK+y&7]WOK
Extracted
Protocol: ftp- Host:
ftp.amtechprinting.com - Port:
21 - Username:
[email protected] - Password:
7DIK+y&7]WOK
Targets
-
-
Target
Amended Order #60-23095847001XXX024.exe
-
Size
694KB
-
MD5
65fc516dfcbb346c2a430dc6709adc5d
-
SHA1
20d5763dd261d2d1e2bbd37174edeaf4c74b6787
-
SHA256
6bc7fd6f54de2d3e47e6e0fe471683c39f12a766a527a7c1ed80b687cd3b747a
-
SHA512
3d9c25ecdd58976f3f2754a3ac5b2942e5bb75a4b352cff4c0964be73d8c43fed7057504061ff6f97afd456e6ac27e33de734b2e84549050438e631f9733f262
-
SSDEEP
12288:LOzScV3vr96xCUb927gFffZVNmNmg0kKd37zMFCHr+KNuhz:yzSOG8y5VNmNV0kKZMyeh
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-