General
-
Target
09e279969ff1fb9e1ccecd8d839d16d78202c046239af407c6da8deebdb709b7
-
Size
378KB
-
Sample
241121-bwrbcsxndt
-
MD5
de15f6290b390c737f20127b26e11479
-
SHA1
5c8623dfb42d2974c3c7d1adeb578282a862927a
-
SHA256
09e279969ff1fb9e1ccecd8d839d16d78202c046239af407c6da8deebdb709b7
-
SHA512
5009cf442a71fa1d415d3316363b6e50ccf4e031de5db015fafdcd8ada752fb73daa6ee689a6738cdb9d143faf34cba51e46a0bba707d2718ef19548afb4b29c
-
SSDEEP
6144:v6vXEz72+jE+mLsMAccP29TooOfYTtRKbO8ESkJTTGLHd:vPk/sMA0soOwTtRKbO5/
Static task
static1
Behavioral task
behavioral1
Sample
09e279969ff1fb9e1ccecd8d839d16d78202c046239af407c6da8deebdb709b7.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Extracted
Protocol: ftp- Host:
ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
09e279969ff1fb9e1ccecd8d839d16d78202c046239af407c6da8deebdb709b7
-
Size
378KB
-
MD5
de15f6290b390c737f20127b26e11479
-
SHA1
5c8623dfb42d2974c3c7d1adeb578282a862927a
-
SHA256
09e279969ff1fb9e1ccecd8d839d16d78202c046239af407c6da8deebdb709b7
-
SHA512
5009cf442a71fa1d415d3316363b6e50ccf4e031de5db015fafdcd8ada752fb73daa6ee689a6738cdb9d143faf34cba51e46a0bba707d2718ef19548afb4b29c
-
SSDEEP
6144:v6vXEz72+jE+mLsMAccP29TooOfYTtRKbO8ESkJTTGLHd:vPk/sMA0soOwTtRKbO5/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-