General
-
Target
f84fb3796d2afde51b6249b7656cef901cf8b66ae2ea5ba105dabc8683cf4236.exe
-
Size
667KB
-
Sample
240905-h6kd5avgkj
-
MD5
e046d7010507e6501ab1c686631afd23
-
SHA1
60d78477fd3e9a17f782a3abdfdea5d3d7fb5239
-
SHA256
f84fb3796d2afde51b6249b7656cef901cf8b66ae2ea5ba105dabc8683cf4236
-
SHA512
1684cb55bcb4d08c75e6bef3ff8833cf0721899d9ab67f7e6bc4b3bf2531aab240ed8ebccdeb543775806d2b2db4f81a6754596234a73d936756837d385998b1
-
SSDEEP
12288:xs05Es3wtYY5taht1nxVmRhHOh50p8ykbOLVtG7mLbrxUh:uyEs3wyEtsfxVm7k28/RKTxU
Static task
static1
Behavioral task
behavioral1
Sample
f84fb3796d2afde51b6249b7656cef901cf8b66ae2ea5ba105dabc8683cf4236.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f84fb3796d2afde51b6249b7656cef901cf8b66ae2ea5ba105dabc8683cf4236.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
q[0r3BqZHV[u
Extracted
Protocol: ftp- Host:
ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
q[0r3BqZHV[u
Targets
-
-
Target
f84fb3796d2afde51b6249b7656cef901cf8b66ae2ea5ba105dabc8683cf4236.exe
-
Size
667KB
-
MD5
e046d7010507e6501ab1c686631afd23
-
SHA1
60d78477fd3e9a17f782a3abdfdea5d3d7fb5239
-
SHA256
f84fb3796d2afde51b6249b7656cef901cf8b66ae2ea5ba105dabc8683cf4236
-
SHA512
1684cb55bcb4d08c75e6bef3ff8833cf0721899d9ab67f7e6bc4b3bf2531aab240ed8ebccdeb543775806d2b2db4f81a6754596234a73d936756837d385998b1
-
SSDEEP
12288:xs05Es3wtYY5taht1nxVmRhHOh50p8ykbOLVtG7mLbrxUh:uyEs3wyEtsfxVm7k28/RKTxU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-