General
-
Target
be8ee0b9bb6e879bfc4200bb28b460f4b109d0f996bf8aee83b1701345888e5d
-
Size
664KB
-
Sample
240524-j5fvzsah3z
-
MD5
a5d31727b6b8a634320e4975c040126e
-
SHA1
2a2d6c153a6bc4545f5e3d154bb2673730f82715
-
SHA256
be8ee0b9bb6e879bfc4200bb28b460f4b109d0f996bf8aee83b1701345888e5d
-
SHA512
bd8f74c57a73975f327f70d8f9ab3181e2f2867c1d6fe2fa8308ae09d69397879a8a557abce9a8e4df955b11e1ab297827827c2ba628b2b2c8d9104f2ae9b415
-
SSDEEP
12288:+4KeAcIKVX63zy9Lbvkziqp/qR8OiWYijVJGP5JLHJiBNkF9yEkYK+8:+uAPKVwlJ/qxNjVIBVpiBNWU
Static task
static1
Behavioral task
behavioral1
Sample
be8ee0b9bb6e879bfc4200bb28b460f4b109d0f996bf8aee83b1701345888e5d.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://us-east-1.sftpcloud.io - Port:
21 - Username:
d637190f8288491f8ab1eabcb79bd808 - Password:
XirWppbzUAA3nzJvDgsGF0MW52PCwLGq
Extracted
Protocol: ftp- Host:
us-east-1.sftpcloud.io - Port:
21 - Username:
d637190f8288491f8ab1eabcb79bd808 - Password:
XirWppbzUAA3nzJvDgsGF0MW52PCwLGq
Targets
-
-
Target
be8ee0b9bb6e879bfc4200bb28b460f4b109d0f996bf8aee83b1701345888e5d
-
Size
664KB
-
MD5
a5d31727b6b8a634320e4975c040126e
-
SHA1
2a2d6c153a6bc4545f5e3d154bb2673730f82715
-
SHA256
be8ee0b9bb6e879bfc4200bb28b460f4b109d0f996bf8aee83b1701345888e5d
-
SHA512
bd8f74c57a73975f327f70d8f9ab3181e2f2867c1d6fe2fa8308ae09d69397879a8a557abce9a8e4df955b11e1ab297827827c2ba628b2b2c8d9104f2ae9b415
-
SSDEEP
12288:+4KeAcIKVX63zy9Lbvkziqp/qR8OiWYijVJGP5JLHJiBNkF9yEkYK+8:+uAPKVwlJ/qxNjVIBVpiBNWU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-