General
-
Target
37305b2adb7c1a41d8119f4c7468a05f86fcaabda638e9bdbcf2c41be283d4ce
-
Size
781KB
-
Sample
241016-bessvsvcmb
-
MD5
590e89df151b7319bc09af9a0fc5bbdd
-
SHA1
8785e3cfd74e0924aa79551bf8515b7e9bd4539c
-
SHA256
37305b2adb7c1a41d8119f4c7468a05f86fcaabda638e9bdbcf2c41be283d4ce
-
SHA512
d7e22133f6c25ebcfba11fd29d1d001c07ed27ee03e4da804cf954045993d7891c2bd266b434407a5494eaa3f945a9d18f75b8e19da9dbbfff4cc62a79b306fa
-
SSDEEP
12288:cX4+v0c0epjTrX9/DQQxPEcB/tYd9uafBYGGG:ctXTB7HxPEcB/lafBYG1
Static task
static1
Behavioral task
behavioral1
Sample
37305b2adb7c1a41d8119f4c7468a05f86fcaabda638e9bdbcf2c41be283d4ce.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Extracted
Protocol: ftp- Host:
ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
37305b2adb7c1a41d8119f4c7468a05f86fcaabda638e9bdbcf2c41be283d4ce
-
Size
781KB
-
MD5
590e89df151b7319bc09af9a0fc5bbdd
-
SHA1
8785e3cfd74e0924aa79551bf8515b7e9bd4539c
-
SHA256
37305b2adb7c1a41d8119f4c7468a05f86fcaabda638e9bdbcf2c41be283d4ce
-
SHA512
d7e22133f6c25ebcfba11fd29d1d001c07ed27ee03e4da804cf954045993d7891c2bd266b434407a5494eaa3f945a9d18f75b8e19da9dbbfff4cc62a79b306fa
-
SSDEEP
12288:cX4+v0c0epjTrX9/DQQxPEcB/tYd9uafBYGGG:ctXTB7HxPEcB/lafBYG1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-