General
-
Target
28e1547d2f6b0fc714c31ed38f107cf4df1247bc3e6d1a24038367ab67f7d81d
-
Size
607KB
-
Sample
240508-bkn2vsae2s
-
MD5
00bcb5dd90d00aa0c91da9b4af28ea87
-
SHA1
66f18e85c07df805d00e0ecb6c710e1a7cad266c
-
SHA256
28e1547d2f6b0fc714c31ed38f107cf4df1247bc3e6d1a24038367ab67f7d81d
-
SHA512
2b195631f7903f9e1da6a8f045498ccd0a028ae7002f2a7416523851004c22ed5f2b86a0a92d8110b270612991d8592467d719fdfd999cecac16bdf5c5f35c9f
-
SSDEEP
12288:AfuDUlEBFsZEOCeiH/SjwdWCpJ7hrOdAjqLPlxBWaq/RaR1ToJSSlNYklcINqpLU:AWDUV6HB/SjhIdBuJWZZa3wSSP65
Static task
static1
Behavioral task
behavioral1
Sample
28e1547d2f6b0fc714c31ed38f107cf4df1247bc3e6d1a24038367ab67f7d81d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
28e1547d2f6b0fc714c31ed38f107cf4df1247bc3e6d1a24038367ab67f7d81d.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
1.$.#t~cK;4C
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
1.$.#t~cK;4C
Targets
-
-
Target
28e1547d2f6b0fc714c31ed38f107cf4df1247bc3e6d1a24038367ab67f7d81d
-
Size
607KB
-
MD5
00bcb5dd90d00aa0c91da9b4af28ea87
-
SHA1
66f18e85c07df805d00e0ecb6c710e1a7cad266c
-
SHA256
28e1547d2f6b0fc714c31ed38f107cf4df1247bc3e6d1a24038367ab67f7d81d
-
SHA512
2b195631f7903f9e1da6a8f045498ccd0a028ae7002f2a7416523851004c22ed5f2b86a0a92d8110b270612991d8592467d719fdfd999cecac16bdf5c5f35c9f
-
SSDEEP
12288:AfuDUlEBFsZEOCeiH/SjwdWCpJ7hrOdAjqLPlxBWaq/RaR1ToJSSlNYklcINqpLU:AWDUV6HB/SjhIdBuJWZZa3wSSP65
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-