General
-
Target
b443234dd2905b1f545abcd1d7af37e65c4f84600a2fec5353af6cfdf81a5cde
-
Size
13KB
-
Sample
240511-bjszesfc46
-
MD5
8caad7671afc57ce07f325d37422539a
-
SHA1
8793cd21c9e80163ecebca08da1b95662201fdb0
-
SHA256
b443234dd2905b1f545abcd1d7af37e65c4f84600a2fec5353af6cfdf81a5cde
-
SHA512
0c57ee81b936139c6dbbe84e4e15d8243cac1d478dbc7ccb893888f9894a11bfa3ad1ec3787431f4ac62580798433b670e29fa5d782e8922670ca538f9455966
-
SSDEEP
384:VfvRZHEBVQPyky0qAkMO7d+mohGqmt37UVnH+bKRpOVpPgR8VNibOHT:leV+v7qAi7gLhGBt37UVee6VR4O
Static task
static1
Behavioral task
behavioral1
Sample
b443234dd2905b1f545abcd1d7af37e65c4f84600a2fec5353af6cfdf81a5cde.vbs
Resource
win7-20240419-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.controlfire.com.mx - Port:
21 - Username:
[email protected] - Password:
0a4XlE=4t8mz
Targets
-
-
Target
b443234dd2905b1f545abcd1d7af37e65c4f84600a2fec5353af6cfdf81a5cde
-
Size
13KB
-
MD5
8caad7671afc57ce07f325d37422539a
-
SHA1
8793cd21c9e80163ecebca08da1b95662201fdb0
-
SHA256
b443234dd2905b1f545abcd1d7af37e65c4f84600a2fec5353af6cfdf81a5cde
-
SHA512
0c57ee81b936139c6dbbe84e4e15d8243cac1d478dbc7ccb893888f9894a11bfa3ad1ec3787431f4ac62580798433b670e29fa5d782e8922670ca538f9455966
-
SSDEEP
384:VfvRZHEBVQPyky0qAkMO7d+mohGqmt37UVnH+bKRpOVpPgR8VNibOHT:leV+v7qAi7gLhGBt37UVee6VR4O
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-