General
-
Target
50d208e6172d067c3426689fdb7450e1b7e5c82a215ad242afd3e65b3d8ea3eb
-
Size
817KB
-
Sample
240524-bf9srsfg72
-
MD5
2de2e1408094ac0197b7b53e4f545fc3
-
SHA1
6eef33a050a2910ea2cab4ff38ee28756a713677
-
SHA256
50d208e6172d067c3426689fdb7450e1b7e5c82a215ad242afd3e65b3d8ea3eb
-
SHA512
4c8bbd6a59390577723c5435b1083d72110d3a023c02af42d306a1bae51475bad65f6e6a5d068a44f72e3954c142637a3353e0e2a0a19f045b6a02dc62cdfd05
-
SSDEEP
12288:tVTLlWskSKSIwH1DAxfSjnXFBu/zaJNzUuMJXIS2Hpsu5+e0eoJO59DI:XLlWJSNItUV0+JNzUt+SypskXm4
Static task
static1
Behavioral task
behavioral1
Sample
50d208e6172d067c3426689fdb7450e1b7e5c82a215ad242afd3e65b3d8ea3eb.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
Cgn+Udqt0F%y
Extracted
Protocol: ftp- Host:
ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
Cgn+Udqt0F%y
Targets
-
-
Target
50d208e6172d067c3426689fdb7450e1b7e5c82a215ad242afd3e65b3d8ea3eb
-
Size
817KB
-
MD5
2de2e1408094ac0197b7b53e4f545fc3
-
SHA1
6eef33a050a2910ea2cab4ff38ee28756a713677
-
SHA256
50d208e6172d067c3426689fdb7450e1b7e5c82a215ad242afd3e65b3d8ea3eb
-
SHA512
4c8bbd6a59390577723c5435b1083d72110d3a023c02af42d306a1bae51475bad65f6e6a5d068a44f72e3954c142637a3353e0e2a0a19f045b6a02dc62cdfd05
-
SSDEEP
12288:tVTLlWskSKSIwH1DAxfSjnXFBu/zaJNzUuMJXIS2Hpsu5+e0eoJO59DI:XLlWJSNItUV0+JNzUt+SypskXm4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-