General
-
Target
270028765f570ebbb238ee6fb9460d1a674707016d97fc988f772195516ad3ff.vbs
-
Size
140KB
-
Sample
241106-cqlpcsshne
-
MD5
cbcf626e71d764c178148e4637e333af
-
SHA1
c3e2615fea0051e63e817c7ad9cc17b59d6da776
-
SHA256
270028765f570ebbb238ee6fb9460d1a674707016d97fc988f772195516ad3ff
-
SHA512
da100c32335caf638e6ccdb0ec37c6e0c6596dfc98b09ef7c39c20911ddadc4576adb67e58187a008be6183bf7cfe89646558bb9abed10374d9e9c5902111fb3
-
SSDEEP
3072:ky7jgt5pEGwprytIsaK18meFZjcrsmiYADap1Ff:KRQjcQmiMp1Ff
Static task
static1
Behavioral task
behavioral1
Sample
270028765f570ebbb238ee6fb9460d1a674707016d97fc988f772195516ad3ff.vbs
Resource
win7-20240903-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Targets
-
-
Target
270028765f570ebbb238ee6fb9460d1a674707016d97fc988f772195516ad3ff.vbs
-
Size
140KB
-
MD5
cbcf626e71d764c178148e4637e333af
-
SHA1
c3e2615fea0051e63e817c7ad9cc17b59d6da776
-
SHA256
270028765f570ebbb238ee6fb9460d1a674707016d97fc988f772195516ad3ff
-
SHA512
da100c32335caf638e6ccdb0ec37c6e0c6596dfc98b09ef7c39c20911ddadc4576adb67e58187a008be6183bf7cfe89646558bb9abed10374d9e9c5902111fb3
-
SSDEEP
3072:ky7jgt5pEGwprytIsaK18meFZjcrsmiYADap1Ff:KRQjcQmiMp1Ff
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-