General
-
Target
856076a266bf66744428123e379d6e54.bin
-
Size
643KB
-
Sample
240706-dhlvtsteqp
-
MD5
a35bf021d3b986187da3449766d95673
-
SHA1
a6dfd92144dbe28c1cdd95daad04361253500a4c
-
SHA256
bf87553e14722b2f7c2649114685bfc258e4d205eb2c3b70ff403a11b06e63e5
-
SHA512
a8db6ec92f040e8376c19fe66a47313ded580c65bdaea4f11cdd32221d42b72d88b213e5ec6b2213daebfba7705f9baa2c4c64bb1c15de9c5264785588906281
-
SSDEEP
12288:Z6QXk+AfNrjLZDIjdbjWldl3Jyf66ec95D4uBarAD9d9t46LNMQxuIOaPd:Zq+A51DIjd23lZC6ZcPcuBp5C6LBOaPd
Static task
static1
Behavioral task
behavioral1
Sample
c09cba9da1f8a6c8fbda87ce1c29455118eb13876286388a7d768ba98585aa78.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c09cba9da1f8a6c8fbda87ce1c29455118eb13876286388a7d768ba98585aa78.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Extracted
Protocol: ftp- Host:
beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Targets
-
-
Target
c09cba9da1f8a6c8fbda87ce1c29455118eb13876286388a7d768ba98585aa78.exe
-
Size
717KB
-
MD5
856076a266bf66744428123e379d6e54
-
SHA1
88e2e194d5944b748671fefa67c61d3c48af7cf6
-
SHA256
c09cba9da1f8a6c8fbda87ce1c29455118eb13876286388a7d768ba98585aa78
-
SHA512
a5aeb1f440fb332eb5c8cac0ac2c2a5027984acf87c16716e5e96620fd4e379e0a07776e35c2099221ae21ad440d83ec98ca6f6bcd7bc163d6c56d91e52458da
-
SSDEEP
12288:4cxbJytLuL+vKDrPvBMVe/CPMvLM2isPhGCMQJ46Bh7zl:4cxbJnHegVTHisJYjUhN
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-