General
-
Target
fb2a50a128afbf9d5534ccb6068fa905982827d34db940abf07417675576e26f
-
Size
998KB
-
Sample
240420-bk3v1sdd2w
-
MD5
ce57959309208fdb8a556b18d1da0c2d
-
SHA1
c4db542e2e8775b638bdba0631f6a6fa1c4a8ed1
-
SHA256
fb2a50a128afbf9d5534ccb6068fa905982827d34db940abf07417675576e26f
-
SHA512
cadc7d2e2d97fe69fa547a37c201b062a250e1478a0be68ba16a7517328702e3a6bc495a1e55ed13b570672386ac06ed2fdfe5f86195251350a4cd140b5d9e1d
-
SSDEEP
12288:rRs3UwQ36kuFvTUr9/IPtBj9GEP/43PL8T7tHESqGDX30a:rRs33kuFY98QEIWBEQj30
Static task
static1
Behavioral task
behavioral1
Sample
fb2a50a128afbf9d5534ccb6068fa905982827d34db940abf07417675576e26f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb2a50a128afbf9d5534ccb6068fa905982827d34db940abf07417675576e26f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ndbplus.rs - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Extracted
Protocol: ftp- Host:
185.119.89.111 - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Targets
-
-
Target
fb2a50a128afbf9d5534ccb6068fa905982827d34db940abf07417675576e26f
-
Size
998KB
-
MD5
ce57959309208fdb8a556b18d1da0c2d
-
SHA1
c4db542e2e8775b638bdba0631f6a6fa1c4a8ed1
-
SHA256
fb2a50a128afbf9d5534ccb6068fa905982827d34db940abf07417675576e26f
-
SHA512
cadc7d2e2d97fe69fa547a37c201b062a250e1478a0be68ba16a7517328702e3a6bc495a1e55ed13b570672386ac06ed2fdfe5f86195251350a4cd140b5d9e1d
-
SSDEEP
12288:rRs3UwQ36kuFvTUr9/IPtBj9GEP/43PL8T7tHESqGDX30a:rRs33kuFY98QEIWBEQj30
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-