General
-
Target
40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4.exe
-
Size
1.1MB
-
Sample
240613-tszsfazenm
-
MD5
4d90f77b8a8e345f4f68083873064a53
-
SHA1
2f4d40852298bc26f6d3e53f8e4d8950bbf2b175
-
SHA256
40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4
-
SHA512
02d0a53bc3b92bad00d3ae762663c3d5233392ae47d7b8fb3e7bcbd4a43532c2bac197121d509fcd8e66ac5883b88aad384d620cdcbde0a2ff1fab0d131c0e35
-
SSDEEP
24576:gAHnh+eWsN3skA4RV1Hom2KXMmHa/0IbLVyCpdpHicu5:Xh+ZkldoPK8Ya/FbLVyCpdy
Static task
static1
Behavioral task
behavioral1
Sample
40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.libreriagandhi.cl - Port:
21 - Username:
[email protected] - Password:
x6p2^m#1#~+O
Targets
-
-
Target
40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4.exe
-
Size
1.1MB
-
MD5
4d90f77b8a8e345f4f68083873064a53
-
SHA1
2f4d40852298bc26f6d3e53f8e4d8950bbf2b175
-
SHA256
40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4
-
SHA512
02d0a53bc3b92bad00d3ae762663c3d5233392ae47d7b8fb3e7bcbd4a43532c2bac197121d509fcd8e66ac5883b88aad384d620cdcbde0a2ff1fab0d131c0e35
-
SSDEEP
24576:gAHnh+eWsN3skA4RV1Hom2KXMmHa/0IbLVyCpdpHicu5:Xh+ZkldoPK8Ya/FbLVyCpdy
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-