General
-
Target
680654b64bbe030b78d39d248787e41051c6f92bcc98b4fbbcbd9246081615b6
-
Size
428KB
-
Sample
240422-bvm8badh6s
-
MD5
222e4ef509194a4247bcb523110e5fc6
-
SHA1
a751e7514ec1bf0512248e071fa35b3611d083d3
-
SHA256
680654b64bbe030b78d39d248787e41051c6f92bcc98b4fbbcbd9246081615b6
-
SHA512
76e3bcde805a0f34feb2ccc800560c0307f248e2613dc27238d4e649b033a4f2097c20d77dbb31670ecee8b7f9ebd857900263e3c8bd0c653818919556708e6d
-
SSDEEP
6144:TZK7MOQgX0tQeoPaFCkToPYAxpGfWFN4iJNHYBAd8sJKruxQOGIusS9gtuL:dQeIaqQ0EfWH4YZRdhG2QXII9gt
Static task
static1
Behavioral task
behavioral1
Sample
680654b64bbe030b78d39d248787e41051c6f92bcc98b4fbbcbd9246081615b6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
680654b64bbe030b78d39d248787e41051c6f92bcc98b4fbbcbd9246081615b6.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
1.$.#t~cK;4C
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
1.$.#t~cK;4C
Targets
-
-
Target
680654b64bbe030b78d39d248787e41051c6f92bcc98b4fbbcbd9246081615b6
-
Size
428KB
-
MD5
222e4ef509194a4247bcb523110e5fc6
-
SHA1
a751e7514ec1bf0512248e071fa35b3611d083d3
-
SHA256
680654b64bbe030b78d39d248787e41051c6f92bcc98b4fbbcbd9246081615b6
-
SHA512
76e3bcde805a0f34feb2ccc800560c0307f248e2613dc27238d4e649b033a4f2097c20d77dbb31670ecee8b7f9ebd857900263e3c8bd0c653818919556708e6d
-
SSDEEP
6144:TZK7MOQgX0tQeoPaFCkToPYAxpGfWFN4iJNHYBAd8sJKruxQOGIusS9gtuL:dQeIaqQ0EfWH4YZRdhG2QXII9gt
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-