General
-
Target
444545470e7680f8dbbb8702aeb6dbe70f12fba4d11855d56dc628e7d6e055bf
-
Size
664KB
-
Sample
240523-b43z5ahc58
-
MD5
2f8f4c24f72ae76abaf7e2ac2f320b3d
-
SHA1
0dd76587c9dc2a4165284250cf26f53e10a6ab4a
-
SHA256
444545470e7680f8dbbb8702aeb6dbe70f12fba4d11855d56dc628e7d6e055bf
-
SHA512
d55807f3a904614e2e6730b7c337e370b92729be51fbb67f2b07065bbfefcbeea6ea1f2bfb3d831f9830ab9d5ffdfa0d59d14d1b3c0cf42f152f840aacbc8057
-
SSDEEP
12288:53bEupN6sR9/7MSwe/glfG2X5cXDCG4n5fn3tf8iqN6zuC6vaBPGB:dvpNb/7MLYquPzL68iqPCI0
Static task
static1
Behavioral task
behavioral1
Sample
444545470e7680f8dbbb8702aeb6dbe70f12fba4d11855d56dc628e7d6e055bf.exe
Resource
win7-20231129-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://eu-west-1.sftpcloud.io - Port:
21 - Username:
13539f2504b743dd98521b85373d3634 - Password:
trkZiFOREY2q6YnhGZIQbUOlqqfy5naj
Extracted
Protocol: ftp- Host:
eu-west-1.sftpcloud.io - Port:
21 - Username:
13539f2504b743dd98521b85373d3634 - Password:
trkZiFOREY2q6YnhGZIQbUOlqqfy5naj
Targets
-
-
Target
444545470e7680f8dbbb8702aeb6dbe70f12fba4d11855d56dc628e7d6e055bf
-
Size
664KB
-
MD5
2f8f4c24f72ae76abaf7e2ac2f320b3d
-
SHA1
0dd76587c9dc2a4165284250cf26f53e10a6ab4a
-
SHA256
444545470e7680f8dbbb8702aeb6dbe70f12fba4d11855d56dc628e7d6e055bf
-
SHA512
d55807f3a904614e2e6730b7c337e370b92729be51fbb67f2b07065bbfefcbeea6ea1f2bfb3d831f9830ab9d5ffdfa0d59d14d1b3c0cf42f152f840aacbc8057
-
SSDEEP
12288:53bEupN6sR9/7MSwe/glfG2X5cXDCG4n5fn3tf8iqN6zuC6vaBPGB:dvpNb/7MLYquPzL68iqPCI0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-