General
-
Target
c28a883476acd1e148f159b51fc60408c361915eb1d8bbb98374777e58ea6666.exe
-
Size
1.2MB
-
Sample
241009-p1rpksyhkg
-
MD5
eb1f8cce1cf50d9af4a3807e98ee25d2
-
SHA1
b58d459ef5cb11f2b8cb7798ceffd9a65d4c9158
-
SHA256
c28a883476acd1e148f159b51fc60408c361915eb1d8bbb98374777e58ea6666
-
SHA512
6f87b8831a49e85ed0d1b14600b7a3030cca3969a280e1733ce9f62ac9860a06e61e150b631f257014eea310a15b9a95d5786880881fddf09cf2ee29fed5a0ca
-
SSDEEP
24576:pRmJkcoQricOIQxiZY1iaQ4UWqbG3MqFst6VoTDg:mJZoQrbTFZY1iaQV3G3MqF/VL
Static task
static1
Behavioral task
behavioral1
Sample
c28a883476acd1e148f159b51fc60408c361915eb1d8bbb98374777e58ea6666.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c28a883476acd1e148f159b51fc60408c361915eb1d8bbb98374777e58ea6666.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Targets
-
-
Target
c28a883476acd1e148f159b51fc60408c361915eb1d8bbb98374777e58ea6666.exe
-
Size
1.2MB
-
MD5
eb1f8cce1cf50d9af4a3807e98ee25d2
-
SHA1
b58d459ef5cb11f2b8cb7798ceffd9a65d4c9158
-
SHA256
c28a883476acd1e148f159b51fc60408c361915eb1d8bbb98374777e58ea6666
-
SHA512
6f87b8831a49e85ed0d1b14600b7a3030cca3969a280e1733ce9f62ac9860a06e61e150b631f257014eea310a15b9a95d5786880881fddf09cf2ee29fed5a0ca
-
SSDEEP
24576:pRmJkcoQricOIQxiZY1iaQ4UWqbG3MqFst6VoTDg:mJZoQrbTFZY1iaQV3G3MqF/VL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-