General
-
Target
df41a311d3067515d27b94217771d7bd4dcaa26602cf24fa007da5067f6bf324
-
Size
1.3MB
-
Sample
240521-b5tg3seb63
-
MD5
84cb60e538c93a91ef95b2a86a326214
-
SHA1
db964bb43c321987e1304e26fd9aec1abd545ba4
-
SHA256
df41a311d3067515d27b94217771d7bd4dcaa26602cf24fa007da5067f6bf324
-
SHA512
857a9308d8cda603df16c47b4f382ba4c2116585e4b8d606ff7f7e880ea8df8426ee85e85aecea7655d339c9275abef92f37a8b3ebeddfea1447cef3e2035a21
-
SSDEEP
12288:5IKWET/mr9K+22BEEzFatn7jO4kqEVSqa/SN948fRKwgRAeOUNXaY8iJPb7yBFwx:xWtb3BEFAuKN+8f8CUNXksXyB1
Static task
static1
Behavioral task
behavioral1
Sample
20052024INV.exe
Resource
win7-20240215-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.klptruck.hu - Port:
21 - Username:
[email protected] - Password:
kCu}[Z7z+)S[
Extracted
Protocol: ftp- Host:
ftp.klptruck.hu - Port:
21 - Username:
[email protected] - Password:
kCu}[Z7z+)S[
Targets
-
-
Target
20052024INV.exe
-
Size
765KB
-
MD5
6d905a81e00e45c08d8a01655510df3d
-
SHA1
2b6f3729d11cb3db0f026bd81e9e003c28a89508
-
SHA256
ed9bf8853a225553c0bb6dd079a0390d9c34c66d9c6f88da4ccfa7ce95740c48
-
SHA512
87aac0a731925c24bc8f256a1bad6e9b9c62aa7e4ea87f9daf1a155e10ac60650d2282efa22e32e8601bdfe2cb8f069e5a38910ef041615abe4991671a9751f6
-
SSDEEP
12288:PIKWET/mr9K+22BEEzFatn7jO4kqEVSqa/SN948fRKwgRAeOUNXaY8iJPb7yBFwx:jWtb3BEFAuKN+8f8CUNXksXyB1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-