General
-
Target
78fcc3b027d03e643ffd64bb3d535c6d1ae38d835b19eec5f936830bd0dbecec.exe
-
Size
1.1MB
-
Sample
241009-cagqga1bqm
-
MD5
6adecf24d7c1bd7fc5340b1d06264fc6
-
SHA1
1ed2515356be1f4f099c32c3a30383f19fd35ed7
-
SHA256
78fcc3b027d03e643ffd64bb3d535c6d1ae38d835b19eec5f936830bd0dbecec
-
SHA512
8ca81c1cf21b3d5fd81c68d0c7447105dafc86e6de6269be65a86acf944ce4492df897d0bc3bf14065b9a09c89f301dc93073f600a06749535269f972b820039
-
SSDEEP
24576:iRmJkcoQricOIQxiZY1iaIoKVdujUQuwD+9ps8NjYG9DHS:3JZoQrbTFZY1iaIoKvujUQ1q9ps8NFe
Static task
static1
Behavioral task
behavioral1
Sample
78fcc3b027d03e643ffd64bb3d535c6d1ae38d835b19eec5f936830bd0dbecec.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
78fcc3b027d03e643ffd64bb3d535c6d1ae38d835b19eec5f936830bd0dbecec.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Targets
-
-
Target
78fcc3b027d03e643ffd64bb3d535c6d1ae38d835b19eec5f936830bd0dbecec.exe
-
Size
1.1MB
-
MD5
6adecf24d7c1bd7fc5340b1d06264fc6
-
SHA1
1ed2515356be1f4f099c32c3a30383f19fd35ed7
-
SHA256
78fcc3b027d03e643ffd64bb3d535c6d1ae38d835b19eec5f936830bd0dbecec
-
SHA512
8ca81c1cf21b3d5fd81c68d0c7447105dafc86e6de6269be65a86acf944ce4492df897d0bc3bf14065b9a09c89f301dc93073f600a06749535269f972b820039
-
SSDEEP
24576:iRmJkcoQricOIQxiZY1iaIoKVdujUQuwD+9ps8NjYG9DHS:3JZoQrbTFZY1iaIoKvujUQ1q9ps8NFe
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-