General
-
Target
f79552d4cb2e41bf92bd82d7ce67e7d9765963e845961065b192db8867b326f6
-
Size
581KB
-
Sample
241121-bfcg9s1rfq
-
MD5
93601ad2d3c9a4cc18d33ca1fb5cfa87
-
SHA1
5ebbff3faab392446ac7cbb431df12ef321546f6
-
SHA256
f79552d4cb2e41bf92bd82d7ce67e7d9765963e845961065b192db8867b326f6
-
SHA512
3fcb6c85a64cdff47c3e4cdf3d760c3046e43d5133e15c9f856d6da018f702037d2bfc68e12f2ae85689a9a8d7202ec2782cb82c7dd519a0e33bf9de0df9d3c1
-
SSDEEP
12288:MCyQbV3V4usbDf0QlFOukO+S3hutphjdbpfijy9eu0Y/DJGn/CvwPtxBIOr:MCyOEu9QlFb/+hBjdbl0Y/DJG/2iqi
Static task
static1
Behavioral task
behavioral1
Sample
OC DDLP - 241119L2.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Targets
-
-
Target
OC DDLP - 241119L2.exe
-
Size
1.1MB
-
MD5
07f3589cb703b42918c9aada57a6e6c3
-
SHA1
65a45025555d388f84c79dbcbecfd79b07a1045d
-
SHA256
0bba9e74459f8350ce9b8da6cb42f8bb006609aedf4f07ec340d07110fb86fb9
-
SHA512
7db82a52efd55ba4a6906d170fccfa1ad8300632c587f45ce557721c04946fc6793b4e987f67eec57182da15cc28286d9a28713c6294ab786e523f619c318096
-
SSDEEP
24576:Ftb20pkaCqT5TBWgNQ7aH6//F9nc0+d36A:2Vg5tQ7aa//F9ncdt5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-