General
-
Target
8554123f241750583436ca6cb53697110f4c243667ecaf56f8bf84638753e947.exe
-
Size
936KB
-
Sample
241102-g8clma1pfl
-
MD5
59ab71bad014148156ac62ab96b7e902
-
SHA1
6ea45665449846a425fc347da7907485aea0b1aa
-
SHA256
8554123f241750583436ca6cb53697110f4c243667ecaf56f8bf84638753e947
-
SHA512
e89fc5d5ee3d9b333fa19339b1708f5478d7f5b54dc6c4b7ea1e842fecc1dd1489470801f2cd053495f9c43850867983c295b08377e2ca78998e1e4fd6f215f3
-
SSDEEP
12288:EA4Rre8Zyqt4VIxQ2ZGskXvu4URu3yqi3Tyw1JHUvZazag1SEErcmK9rL4TgDcH9:V1gRuK3BJHi2R1SevXgQ
Static task
static1
Behavioral task
behavioral1
Sample
8554123f241750583436ca6cb53697110f4c243667ecaf56f8bf84638753e947.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Extracted
Protocol: ftp- Host:
ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
8554123f241750583436ca6cb53697110f4c243667ecaf56f8bf84638753e947.exe
-
Size
936KB
-
MD5
59ab71bad014148156ac62ab96b7e902
-
SHA1
6ea45665449846a425fc347da7907485aea0b1aa
-
SHA256
8554123f241750583436ca6cb53697110f4c243667ecaf56f8bf84638753e947
-
SHA512
e89fc5d5ee3d9b333fa19339b1708f5478d7f5b54dc6c4b7ea1e842fecc1dd1489470801f2cd053495f9c43850867983c295b08377e2ca78998e1e4fd6f215f3
-
SSDEEP
12288:EA4Rre8Zyqt4VIxQ2ZGskXvu4URu3yqi3Tyw1JHUvZazag1SEErcmK9rL4TgDcH9:V1gRuK3BJHi2R1SevXgQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-