General
-
Target
fc64d6731b6644bb92d19271793e07b8f35f78edbd7bb95c51631af7449fa85b
-
Size
1.0MB
-
Sample
240427-bmh9dsfh33
-
MD5
0daa50cad2ee95eb9024ae33a4a44ae1
-
SHA1
85ce6bbad830a99bf99f179dc748fc3b395e1fae
-
SHA256
fc64d6731b6644bb92d19271793e07b8f35f78edbd7bb95c51631af7449fa85b
-
SHA512
cd61866ba8390ed3936bceeea84330c46a816928d4aaec5dce29ff5825fdd4f0098b67ff51464794443e7ee877fe2a61a7a502750fa400fb149c962901320895
-
SSDEEP
24576:kAHnh+eWsN3skA4RV1Hom2KXMmHaMU0L5mVWW5:zh+ZkldoPK8YaMUg5mV
Static task
static1
Behavioral task
behavioral1
Sample
fc64d6731b6644bb92d19271793e07b8f35f78edbd7bb95c51631af7449fa85b.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
fc64d6731b6644bb92d19271793e07b8f35f78edbd7bb95c51631af7449fa85b.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
fc64d6731b6644bb92d19271793e07b8f35f78edbd7bb95c51631af7449fa85b
-
Size
1.0MB
-
MD5
0daa50cad2ee95eb9024ae33a4a44ae1
-
SHA1
85ce6bbad830a99bf99f179dc748fc3b395e1fae
-
SHA256
fc64d6731b6644bb92d19271793e07b8f35f78edbd7bb95c51631af7449fa85b
-
SHA512
cd61866ba8390ed3936bceeea84330c46a816928d4aaec5dce29ff5825fdd4f0098b67ff51464794443e7ee877fe2a61a7a502750fa400fb149c962901320895
-
SSDEEP
24576:kAHnh+eWsN3skA4RV1Hom2KXMmHaMU0L5mVWW5:zh+ZkldoPK8YaMUg5mV
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-