General
-
Target
23cd69950b5ba9c42eaa5fb9e380c0bc6ebf4533404ede15a6ed0f6abfe48627.exe
-
Size
3.1MB
-
Sample
240509-l2a7faca5w
-
MD5
5a4907e21a350b8f5ec41bc97c68dc4b
-
SHA1
901f3101d1ba75e8e49730959f41ba298cca12ee
-
SHA256
23cd69950b5ba9c42eaa5fb9e380c0bc6ebf4533404ede15a6ed0f6abfe48627
-
SHA512
8b7167d4f5ded57dd5d7b59c1e0716e91ab01a31e17386cfe8bcef9b95fb937de9079c930cfd98a291afee81ce4ad39451463832d09f64b57fdf51a7cdda5eaf
-
SSDEEP
49152:HzBfc7DQp8TtBl1U6rHcSclWL9O12nGaSF5wNTiFXWgiq9ipyg7sduyGaacWVkXG:Hzu4GobSFqYlX63rzQ2S
Static task
static1
Behavioral task
behavioral1
Sample
23cd69950b5ba9c42eaa5fb9e380c0bc6ebf4533404ede15a6ed0f6abfe48627.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23cd69950b5ba9c42eaa5fb9e380c0bc6ebf4533404ede15a6ed0f6abfe48627.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.kenvue.cam - Port:
21 - Username:
[email protected] - Password:
fmreport12345
Targets
-
-
Target
23cd69950b5ba9c42eaa5fb9e380c0bc6ebf4533404ede15a6ed0f6abfe48627.exe
-
Size
3.1MB
-
MD5
5a4907e21a350b8f5ec41bc97c68dc4b
-
SHA1
901f3101d1ba75e8e49730959f41ba298cca12ee
-
SHA256
23cd69950b5ba9c42eaa5fb9e380c0bc6ebf4533404ede15a6ed0f6abfe48627
-
SHA512
8b7167d4f5ded57dd5d7b59c1e0716e91ab01a31e17386cfe8bcef9b95fb937de9079c930cfd98a291afee81ce4ad39451463832d09f64b57fdf51a7cdda5eaf
-
SSDEEP
49152:HzBfc7DQp8TtBl1U6rHcSclWL9O12nGaSF5wNTiFXWgiq9ipyg7sduyGaacWVkXG:Hzu4GobSFqYlX63rzQ2S
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-