General
-
Target
400ebef069d04c104e379cb12ab8e9b90e4b4e82f8dae25754b5f25da51b0fa1
-
Size
1.0MB
-
Sample
241119-b2374stmbq
-
MD5
363b960030ff1cf563b86b66aaed188a
-
SHA1
e8569007578670e8c317968f1cbcc621df5c188c
-
SHA256
400ebef069d04c104e379cb12ab8e9b90e4b4e82f8dae25754b5f25da51b0fa1
-
SHA512
06940c3bcdf52228ad54a69e24703aa57d76012a9d8386bd17983ee14035eaf99402b797c23253de6fc8aa074b1c71a489106baabe601ed8bf2ecab1614f5781
-
SSDEEP
24576:Btb20pkaCqT5TBWgNQ7aNJd0lr4dTIN46A:SVg5tQ7aNJd04z5
Static task
static1
Behavioral task
behavioral1
Sample
400ebef069d04c104e379cb12ab8e9b90e4b4e82f8dae25754b5f25da51b0fa1.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
s04.$S]nbXTq
Targets
-
-
Target
400ebef069d04c104e379cb12ab8e9b90e4b4e82f8dae25754b5f25da51b0fa1
-
Size
1.0MB
-
MD5
363b960030ff1cf563b86b66aaed188a
-
SHA1
e8569007578670e8c317968f1cbcc621df5c188c
-
SHA256
400ebef069d04c104e379cb12ab8e9b90e4b4e82f8dae25754b5f25da51b0fa1
-
SHA512
06940c3bcdf52228ad54a69e24703aa57d76012a9d8386bd17983ee14035eaf99402b797c23253de6fc8aa074b1c71a489106baabe601ed8bf2ecab1614f5781
-
SSDEEP
24576:Btb20pkaCqT5TBWgNQ7aNJd0lr4dTIN46A:SVg5tQ7aNJd04z5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-