General
-
Target
c095ec33b15cca5a4f5f942e68005dd6634394cf41327aa88363602bc313d354
-
Size
1.1MB
-
Sample
240625-chqncaybnn
-
MD5
736222425cc13d3cc4cca569de8e7098
-
SHA1
df43a86159497b9b162c30be46a9e2157982809a
-
SHA256
c095ec33b15cca5a4f5f942e68005dd6634394cf41327aa88363602bc313d354
-
SHA512
593ad1476f32263f1cea3b00b813369aa9ed44ae31b7061eb18933525334f97bd0fb12cfbb1a0d2463855ee58d7e96962360bb819f880e3fca068f8f6e39b26b
-
SSDEEP
24576:wAHnh+eWsN3skA4RV1Hom2KXMmHaNXcSPNtWK6p/jP5:nh+ZkldoPK8YaNXxPNtWK6X
Static task
static1
Behavioral task
behavioral1
Sample
c095ec33b15cca5a4f5f942e68005dd6634394cf41327aa88363602bc313d354.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c095ec33b15cca5a4f5f942e68005dd6634394cf41327aa88363602bc313d354.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
u;4z3V.Iir1l
Targets
-
-
Target
c095ec33b15cca5a4f5f942e68005dd6634394cf41327aa88363602bc313d354
-
Size
1.1MB
-
MD5
736222425cc13d3cc4cca569de8e7098
-
SHA1
df43a86159497b9b162c30be46a9e2157982809a
-
SHA256
c095ec33b15cca5a4f5f942e68005dd6634394cf41327aa88363602bc313d354
-
SHA512
593ad1476f32263f1cea3b00b813369aa9ed44ae31b7061eb18933525334f97bd0fb12cfbb1a0d2463855ee58d7e96962360bb819f880e3fca068f8f6e39b26b
-
SSDEEP
24576:wAHnh+eWsN3skA4RV1Hom2KXMmHaNXcSPNtWK6p/jP5:nh+ZkldoPK8YaNXxPNtWK6X
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-