General
-
Target
f0ef89353e71f7ccff747c2a035e8827d67c5dc785780ba49902a2ab0a6bf83aN
-
Size
746KB
-
Sample
241006-bmn5msshma
-
MD5
de8af55afa1398865523d82987aaadc0
-
SHA1
8aa3ed53e57da5f594b292a22d0e32f6b32cde2f
-
SHA256
f0ef89353e71f7ccff747c2a035e8827d67c5dc785780ba49902a2ab0a6bf83a
-
SHA512
af09ded68889b66b4cdf2a4620abbe4f45b0bc784863a2a6322fb9ba788868875dea07d51d88a58fd5fd42b827ec510078824a56e9542a59a339d2362ecbdc0e
-
SSDEEP
12288:rHlki37+QfqdS5eYW/CPfbn4Hdx+IJC3QeyNjKZf/oXJ4D:rFtqQoS4YXHL4HdxVC3r4wfs2
Static task
static1
Behavioral task
behavioral1
Sample
f0ef89353e71f7ccff747c2a035e8827d67c5dc785780ba49902a2ab0a6bf83aN.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
UL^Y]#$dMj?2
Extracted
Protocol: ftp- Host:
ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
UL^Y]#$dMj?2
Targets
-
-
Target
f0ef89353e71f7ccff747c2a035e8827d67c5dc785780ba49902a2ab0a6bf83aN
-
Size
746KB
-
MD5
de8af55afa1398865523d82987aaadc0
-
SHA1
8aa3ed53e57da5f594b292a22d0e32f6b32cde2f
-
SHA256
f0ef89353e71f7ccff747c2a035e8827d67c5dc785780ba49902a2ab0a6bf83a
-
SHA512
af09ded68889b66b4cdf2a4620abbe4f45b0bc784863a2a6322fb9ba788868875dea07d51d88a58fd5fd42b827ec510078824a56e9542a59a339d2362ecbdc0e
-
SSDEEP
12288:rHlki37+QfqdS5eYW/CPfbn4Hdx+IJC3QeyNjKZf/oXJ4D:rFtqQoS4YXHL4HdxVC3r4wfs2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-