General
-
Target
474a19c1741d117b14db17ce939b6c0d32e6b1dff07f6accd386df737484753c
-
Size
793KB
-
Sample
240927-srhxvsydrk
-
MD5
e3d8f3e16effe94ba64ef6f9a69531ba
-
SHA1
8ecc3a50f77cee4cfb119fbc1b6ac926ccb99ead
-
SHA256
474a19c1741d117b14db17ce939b6c0d32e6b1dff07f6accd386df737484753c
-
SHA512
53b140169fb4bdb12b783402cb7b8009ede27878cc791fcd2f4b614a4a31fb8804e4b38a2b57e29cb9d6688528639e41078d0b7f2dc8c79b60b8677dd2644531
-
SSDEEP
24576:nznRaMQS4AJc6+/Q1qpcLUMencFKDcGR0mw4KgU:nznR7jQxOZenR0mw4Kd
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATIONS#08670.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATIONS#08670.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Targets
-
-
Target
QUOTATIONS#08670.exe
-
Size
1.2MB
-
MD5
d7161989ed8189378bdabf98711afd2d
-
SHA1
5564678d3f4c6be02c79762f6ff42d93b011c3b2
-
SHA256
78af8e41027a1d90e32ebb240d9678217838737ddcda978ea711f9eaf8a283cf
-
SHA512
162f5f93f4418327e8986f405fb2560de9d8a810e21214421868803fa5feaf70ee4aa93c7698e42bc46ab6af89add965e509f421088fbd2591093f158fd1c82a
-
SSDEEP
24576:pRmJkcoQricOIQxiZY1iaQ3nNqU8inKUncVMb2Yzi/nm:mJZoQrbTFZY1iaQcgpnugr+nm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-