General
-
Target
744131f8b802463e9cb89790e51aaf199d90cb3240926566305789927a2a6ad8
-
Size
657KB
-
Sample
240430-cht1rshh2y
-
MD5
8a305302c0f9c62422894f981d8cda87
-
SHA1
c5edd88b07760d9479766a4c34fe38a52c043d4b
-
SHA256
744131f8b802463e9cb89790e51aaf199d90cb3240926566305789927a2a6ad8
-
SHA512
16e87bf6e48a583276a8b834ba6ecbed714ed14f69f5bc2bd8a047c1935ed38969f619b05d9accc7ae5bbf08fa85e05b092b964872478673dea86d2a03caed2e
-
SSDEEP
12288:GlbB778Q5ookXrAad/RHX+lr0f6Mhdb7ZoeXsZ2xci66u4yzjPjTv1fyywtRi:YbB3oo4lFX+ivVZ88xccu4yXv1fok
Static task
static1
Behavioral task
behavioral1
Sample
744131f8b802463e9cb89790e51aaf199d90cb3240926566305789927a2a6ad8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
744131f8b802463e9cb89790e51aaf199d90cb3240926566305789927a2a6ad8.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.wapination.net - Port:
21 - Username:
[email protected] - Password:
sync@#1235
Extracted
Protocol: ftp- Host:
ftp.wapination.net - Port:
21 - Username:
[email protected] - Password:
sync@#1235
Targets
-
-
Target
744131f8b802463e9cb89790e51aaf199d90cb3240926566305789927a2a6ad8
-
Size
657KB
-
MD5
8a305302c0f9c62422894f981d8cda87
-
SHA1
c5edd88b07760d9479766a4c34fe38a52c043d4b
-
SHA256
744131f8b802463e9cb89790e51aaf199d90cb3240926566305789927a2a6ad8
-
SHA512
16e87bf6e48a583276a8b834ba6ecbed714ed14f69f5bc2bd8a047c1935ed38969f619b05d9accc7ae5bbf08fa85e05b092b964872478673dea86d2a03caed2e
-
SSDEEP
12288:GlbB778Q5ookXrAad/RHX+lr0f6Mhdb7ZoeXsZ2xci66u4yzjPjTv1fyywtRi:YbB3oo4lFX+ivVZ88xccu4yXv1fok
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-