General
-
Target
24a12d1c4ce08312e23c6a76f4582dc8a64b0c6d429476a3f32fd9640d0f4ba3
-
Size
1.1MB
-
Sample
240425-crjldsde47
-
MD5
49f99906fab488abe13834fe045baf10
-
SHA1
928c08f017261bbb84634bb441a583653703f0a9
-
SHA256
24a12d1c4ce08312e23c6a76f4582dc8a64b0c6d429476a3f32fd9640d0f4ba3
-
SHA512
114d6694428a324c35cc70928cfdfa87a6410036548546856a1d880bd3931bc5534a1bbe4d042e0546002e8c8cc87015f9cf03356e64c0efc66b15ad5a36b86b
-
SSDEEP
24576:8AHnh+eWsN3skA4RV1Hom2KXcmtcRhe2g1oeTEufjj5:bh+ZkldoPKsacrJmoeAcx
Static task
static1
Behavioral task
behavioral1
Sample
24a12d1c4ce08312e23c6a76f4582dc8a64b0c6d429476a3f32fd9640d0f4ba3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24a12d1c4ce08312e23c6a76f4582dc8a64b0c6d429476a3f32fd9640d0f4ba3.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
24a12d1c4ce08312e23c6a76f4582dc8a64b0c6d429476a3f32fd9640d0f4ba3
-
Size
1.1MB
-
MD5
49f99906fab488abe13834fe045baf10
-
SHA1
928c08f017261bbb84634bb441a583653703f0a9
-
SHA256
24a12d1c4ce08312e23c6a76f4582dc8a64b0c6d429476a3f32fd9640d0f4ba3
-
SHA512
114d6694428a324c35cc70928cfdfa87a6410036548546856a1d880bd3931bc5534a1bbe4d042e0546002e8c8cc87015f9cf03356e64c0efc66b15ad5a36b86b
-
SSDEEP
24576:8AHnh+eWsN3skA4RV1Hom2KXcmtcRhe2g1oeTEufjj5:bh+ZkldoPKsacrJmoeAcx
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-