General
-
Target
QUOTATION#5400.exe
-
Size
1.1MB
-
Sample
241014-r2fd2szemg
-
MD5
c2d989a867f925afc6940a7bad9aedee
-
SHA1
111b0b6612f6a095815d5d73c85c703eacc39702
-
SHA256
1d789cde86d7ca676b8897c2de561e20f61bd9cdd708be9da7a2d9304df0ee02
-
SHA512
902b549b97f6e005386dfb29b0e31f29541a15c7ac8fcfb4ca1b05697be4084ddf705a4d9629df23804c1b254396576d3677d32728d71f67696eb67673b52d74
-
SSDEEP
24576:WfmMv6Ckr7Mny5Q6SfQVZj/8gzyALrh+XyD7eV:W3v+7/5Q6SfQb84h+CD6
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION#5400.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION#5400.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
uy,o#mZj8$lY
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
uy,o#mZj8$lY
Targets
-
-
Target
QUOTATION#5400.exe
-
Size
1.1MB
-
MD5
c2d989a867f925afc6940a7bad9aedee
-
SHA1
111b0b6612f6a095815d5d73c85c703eacc39702
-
SHA256
1d789cde86d7ca676b8897c2de561e20f61bd9cdd708be9da7a2d9304df0ee02
-
SHA512
902b549b97f6e005386dfb29b0e31f29541a15c7ac8fcfb4ca1b05697be4084ddf705a4d9629df23804c1b254396576d3677d32728d71f67696eb67673b52d74
-
SSDEEP
24576:WfmMv6Ckr7Mny5Q6SfQVZj/8gzyALrh+XyD7eV:W3v+7/5Q6SfQb84h+CD6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-