General
-
Target
9969e80d0d9dab91ac7ac150f904bf2d845dd844aaed6a4038989759dd110c4f
-
Size
760KB
-
Sample
240528-bwyqfahf8w
-
MD5
e4200edb21e1b7fcc8a805e54d526ff7
-
SHA1
7284a2d6ba882f1c87471869a66ac9194be5fd98
-
SHA256
9969e80d0d9dab91ac7ac150f904bf2d845dd844aaed6a4038989759dd110c4f
-
SHA512
e5e63579cff98e44864aa740c6fe14a2841587c2b0888bf32d23f263bd585452dd8f74db345119c447a67ee3fe7cccd9e1a1448bbac505a03aa7f44e6289d8c5
-
SSDEEP
12288:tHThyvK/R7Z2TnMT+SEdFzu1IZbJMJr+qotSYtGL5suioykX02noYsos+Op:t9yHMUC1IZbJ9tJkL57kt2n4/+O
Static task
static1
Behavioral task
behavioral1
Sample
9969e80d0d9dab91ac7ac150f904bf2d845dd844aaed6a4038989759dd110c4f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9969e80d0d9dab91ac7ac150f904bf2d845dd844aaed6a4038989759dd110c4f.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Extracted
Protocol: ftp- Host:
beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Targets
-
-
Target
9969e80d0d9dab91ac7ac150f904bf2d845dd844aaed6a4038989759dd110c4f
-
Size
760KB
-
MD5
e4200edb21e1b7fcc8a805e54d526ff7
-
SHA1
7284a2d6ba882f1c87471869a66ac9194be5fd98
-
SHA256
9969e80d0d9dab91ac7ac150f904bf2d845dd844aaed6a4038989759dd110c4f
-
SHA512
e5e63579cff98e44864aa740c6fe14a2841587c2b0888bf32d23f263bd585452dd8f74db345119c447a67ee3fe7cccd9e1a1448bbac505a03aa7f44e6289d8c5
-
SSDEEP
12288:tHThyvK/R7Z2TnMT+SEdFzu1IZbJMJr+qotSYtGL5suioykX02noYsos+Op:t9yHMUC1IZbJ9tJkL57kt2n4/+O
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-