General
-
Target
4f8d7aa14593782e3f7ce667f4be630b251f7ff51b2c16b029f4bd977d9db65cN
-
Size
1.1MB
-
Sample
241016-l9377avarh
-
MD5
fc71b1d111decdffd64086b63b2c7e90
-
SHA1
d670287c6d79e09d3089579df7b174045ac3e02f
-
SHA256
4f8d7aa14593782e3f7ce667f4be630b251f7ff51b2c16b029f4bd977d9db65c
-
SHA512
37abc041dc0cb6fe72ea97bec9a8c6c83e07e990b001f8af55d779561de31a9210a5a95691dc2c5e3f842003e6d3ff42bbde9e13d2de04ccaf6a0c34368adf32
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLVBFb4nxToeTRwYo2Qo7jgjXp:f3v+7/5QLVzbgTDeYFQ5zp
Static task
static1
Behavioral task
behavioral1
Sample
4f8d7aa14593782e3f7ce667f4be630b251f7ff51b2c16b029f4bd977d9db65cN.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
UL^Y]#$dMj?2
Targets
-
-
Target
4f8d7aa14593782e3f7ce667f4be630b251f7ff51b2c16b029f4bd977d9db65cN
-
Size
1.1MB
-
MD5
fc71b1d111decdffd64086b63b2c7e90
-
SHA1
d670287c6d79e09d3089579df7b174045ac3e02f
-
SHA256
4f8d7aa14593782e3f7ce667f4be630b251f7ff51b2c16b029f4bd977d9db65c
-
SHA512
37abc041dc0cb6fe72ea97bec9a8c6c83e07e990b001f8af55d779561de31a9210a5a95691dc2c5e3f842003e6d3ff42bbde9e13d2de04ccaf6a0c34368adf32
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLVBFb4nxToeTRwYo2Qo7jgjXp:f3v+7/5QLVzbgTDeYFQ5zp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-