General
-
Target
f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022
-
Size
714KB
-
Sample
240314-cmt7bsga6z
-
MD5
e152f45fc44509ba5b06c5e9947db045
-
SHA1
ae21e818538dff3462f57d25bef40d08507cb923
-
SHA256
f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022
-
SHA512
9f160e82996e22dfe241c37428b97a81cb2072a34be38746dffdbc5a49da461f0e48310935548e2c979eda3e2aec4364d2559b3cee6cddf84447afc751ad0b80
-
SSDEEP
12288:YHwgk26OZDx/OSL9igx26Ifj6iubmMIc+MjbHSnhsRMUIFFTdr:4/VWYhsb6ifyvjGhsCFT
Static task
static1
Behavioral task
behavioral1
Sample
f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
UL^Y]#$dMj?2
Targets
-
-
Target
f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022
-
Size
714KB
-
MD5
e152f45fc44509ba5b06c5e9947db045
-
SHA1
ae21e818538dff3462f57d25bef40d08507cb923
-
SHA256
f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022
-
SHA512
9f160e82996e22dfe241c37428b97a81cb2072a34be38746dffdbc5a49da461f0e48310935548e2c979eda3e2aec4364d2559b3cee6cddf84447afc751ad0b80
-
SSDEEP
12288:YHwgk26OZDx/OSL9igx26Ifj6iubmMIc+MjbHSnhsRMUIFFTdr:4/VWYhsb6ifyvjGhsCFT
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-