General
-
Target
6deca5f293b38099e0414eb589451aa6880e7c4e2812f90dd6d59fcb768409c6
-
Size
769KB
-
Sample
241121-bqxwysxbmb
-
MD5
408a48c1608970d44f98725c56fc1fdf
-
SHA1
7253a22b1966427ec989c8fcc892fbf51086ced6
-
SHA256
6deca5f293b38099e0414eb589451aa6880e7c4e2812f90dd6d59fcb768409c6
-
SHA512
ac02fce542ff5c315773e48aa192b4b23647387529826ca48a372bc7ec70bd003ebb0e3cc30ea54f7af17423a417d8024922a47cd42cd5881496e86ca6538b86
-
SSDEEP
12288:4rOJ+Ri3AgFd1DQrQzPzs9C/vm/AncL47aXCaMv6eEJ4T7o6M88g/orX04RTBWjc:UQ3AgCtWyAe47aXCaSDmuoI84oI6WFE
Static task
static1
Behavioral task
behavioral1
Sample
6deca5f293b38099e0414eb589451aa6880e7c4e2812f90dd6d59fcb768409c6.exe
Resource
win7-20240903-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
,%EVY$JU0=lu
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
,%EVY$JU0=lu
Targets
-
-
Target
6deca5f293b38099e0414eb589451aa6880e7c4e2812f90dd6d59fcb768409c6
-
Size
769KB
-
MD5
408a48c1608970d44f98725c56fc1fdf
-
SHA1
7253a22b1966427ec989c8fcc892fbf51086ced6
-
SHA256
6deca5f293b38099e0414eb589451aa6880e7c4e2812f90dd6d59fcb768409c6
-
SHA512
ac02fce542ff5c315773e48aa192b4b23647387529826ca48a372bc7ec70bd003ebb0e3cc30ea54f7af17423a417d8024922a47cd42cd5881496e86ca6538b86
-
SSDEEP
12288:4rOJ+Ri3AgFd1DQrQzPzs9C/vm/AncL47aXCaMv6eEJ4T7o6M88g/orX04RTBWjc:UQ3AgCtWyAe47aXCaSDmuoI84oI6WFE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1