General
-
Target
PO82107048.exe
-
Size
1016KB
-
Sample
240523-atlgnaeg6w
-
MD5
7bf76bfeb13cf8591ceb55831aaac798
-
SHA1
4c8d769159e5a3c97bc9624fee39eb88ba6cc6e3
-
SHA256
ddd79a72fd23b7e09cea44428077aec20922523a6ae2ec4b06eddbbc5d9e8698
-
SHA512
c846876b9e3250fa4e35bc52ac45dc102e9bc50f946b21f508456af68543de150c3767ac41490f287a8c6c3a9f17c8504ceb27c2f80cf40cd152abda723bd07d
-
SSDEEP
24576:RAHnh+eWsN3skA4RV1Hom2KXMmHaTxQQ4VkYYMa5:oh+ZkldoPK8YaT6jVkdp
Static task
static1
Behavioral task
behavioral1
Sample
PO82107048.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
PO82107048.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
(=8fPSH$KO_!
Targets
-
-
Target
PO82107048.exe
-
Size
1016KB
-
MD5
7bf76bfeb13cf8591ceb55831aaac798
-
SHA1
4c8d769159e5a3c97bc9624fee39eb88ba6cc6e3
-
SHA256
ddd79a72fd23b7e09cea44428077aec20922523a6ae2ec4b06eddbbc5d9e8698
-
SHA512
c846876b9e3250fa4e35bc52ac45dc102e9bc50f946b21f508456af68543de150c3767ac41490f287a8c6c3a9f17c8504ceb27c2f80cf40cd152abda723bd07d
-
SSDEEP
24576:RAHnh+eWsN3skA4RV1Hom2KXMmHaTxQQ4VkYYMa5:oh+ZkldoPK8YaT6jVkdp
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-