General
-
Target
2bb2e9599aa2d121b66e51b6f5da373c8927825cbce2348d16c60cd5f625e63b
-
Size
709KB
-
Sample
240514-bvdnwaec22
-
MD5
b5b32e04f5869a6ebabe7ce58b187a6c
-
SHA1
a1abfafe74d66096a16f3dafd755048d3707f0f5
-
SHA256
2bb2e9599aa2d121b66e51b6f5da373c8927825cbce2348d16c60cd5f625e63b
-
SHA512
6cd9176401ead8d09d73447c572664a4b060a127c595415b78415617f189fdd45d301482cd7195b0a874b0bca2b8d6943649b6a7108bd8bc6723e53e347dbfb6
-
SSDEEP
12288:8MTeH81jJU815KiLR1Y53zDfS1L5e3oYwl8Ddq6UMZ/AqGnlQwrYapHzwCwbMzM:88MurY53P+0lw2DTUY4HldrYapHz7xo
Static task
static1
Behavioral task
behavioral1
Sample
2bb2e9599aa2d121b66e51b6f5da373c8927825cbce2348d16c60cd5f625e63b.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.klptruck.hu - Port:
21 - Username:
[email protected] - Password:
kCu}[Z7z+)S[
Extracted
Protocol: ftp- Host:
ftp.klptruck.hu - Port:
21 - Username:
[email protected] - Password:
kCu}[Z7z+)S[
Targets
-
-
Target
2bb2e9599aa2d121b66e51b6f5da373c8927825cbce2348d16c60cd5f625e63b
-
Size
709KB
-
MD5
b5b32e04f5869a6ebabe7ce58b187a6c
-
SHA1
a1abfafe74d66096a16f3dafd755048d3707f0f5
-
SHA256
2bb2e9599aa2d121b66e51b6f5da373c8927825cbce2348d16c60cd5f625e63b
-
SHA512
6cd9176401ead8d09d73447c572664a4b060a127c595415b78415617f189fdd45d301482cd7195b0a874b0bca2b8d6943649b6a7108bd8bc6723e53e347dbfb6
-
SSDEEP
12288:8MTeH81jJU815KiLR1Y53zDfS1L5e3oYwl8Ddq6UMZ/AqGnlQwrYapHzwCwbMzM:88MurY53P+0lw2DTUY4HldrYapHz7xo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-