General
-
Target
d43bbb12439e01cfb7ef776c0ed2360b82fa28d83c5162797695f2cd9bec4713
-
Size
2.4MB
-
Sample
241212-bm147szlcn
-
MD5
7eb27936f4d6f81dc26dc7da0ec3bb70
-
SHA1
e79407b7337e5f0dbcadebca70bbd95fa1a30f1a
-
SHA256
d43bbb12439e01cfb7ef776c0ed2360b82fa28d83c5162797695f2cd9bec4713
-
SHA512
bd3e32e88464374746be1a477e77aab37b846c0897a4664783fd24d2ebf8c5f16b75c2ab76b4a3e82074cb1c55ead3dac950e613b51351945f6daa8c6c283374
-
SSDEEP
49152:x3AQbdYAm4zEbdYAm4zWbdYAm4z23Aw3AWbdYAm4zSbdYAm4zO3AWypvLe6mTPLc:VAadrWdr0drkAiA0dr4dr8AJTmbI
Static task
static1
Behavioral task
behavioral1
Sample
d43bbb12439e01cfb7ef776c0ed2360b82fa28d83c5162797695f2cd9bec4713.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.horeca-bucuresti.ro - Port:
21 - Username:
[email protected] - Password:
e)rWKbKP8~mO
Targets
-
-
Target
d43bbb12439e01cfb7ef776c0ed2360b82fa28d83c5162797695f2cd9bec4713
-
Size
2.4MB
-
MD5
7eb27936f4d6f81dc26dc7da0ec3bb70
-
SHA1
e79407b7337e5f0dbcadebca70bbd95fa1a30f1a
-
SHA256
d43bbb12439e01cfb7ef776c0ed2360b82fa28d83c5162797695f2cd9bec4713
-
SHA512
bd3e32e88464374746be1a477e77aab37b846c0897a4664783fd24d2ebf8c5f16b75c2ab76b4a3e82074cb1c55ead3dac950e613b51351945f6daa8c6c283374
-
SSDEEP
49152:x3AQbdYAm4zEbdYAm4zWbdYAm4z23Aw3AWbdYAm4zSbdYAm4zO3AWypvLe6mTPLc:VAadrWdr0drkAiA0dr4dr8AJTmbI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-