General
-
Target
06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af.exe
-
Size
1.0MB
-
Sample
250111-clp6zs1mdp
-
MD5
edb2e2cea8df699849675ccf5f9b12b4
-
SHA1
a5eb63f4ad859b4925ca9f6a7511c13201387256
-
SHA256
06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af
-
SHA512
3e0181f68c6a6881d18ffb79938672d0c2e948e4931332481072d18cf67ea29ce3d89976a1277a4ab21c32e6913043af1bbeba8bcbcebcb93cd615e6164361f8
-
SSDEEP
24576:qu6J33O0c+JY5UZ+XC0kGso6FaX4pSSSoiPGHDBWY:cu0c++OCvkGs9FaX1SNiPGYY
Static task
static1
Behavioral task
behavioral1
Sample
06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
Q6]7rLSD*gU2
Targets
-
-
Target
06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af.exe
-
Size
1.0MB
-
MD5
edb2e2cea8df699849675ccf5f9b12b4
-
SHA1
a5eb63f4ad859b4925ca9f6a7511c13201387256
-
SHA256
06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af
-
SHA512
3e0181f68c6a6881d18ffb79938672d0c2e948e4931332481072d18cf67ea29ce3d89976a1277a4ab21c32e6913043af1bbeba8bcbcebcb93cd615e6164361f8
-
SSDEEP
24576:qu6J33O0c+JY5UZ+XC0kGso6FaX4pSSSoiPGHDBWY:cu0c++OCvkGs9FaX1SNiPGYY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-