General
-
Target
ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03
-
Size
1.5MB
-
Sample
250112-bqfmnsymgy
-
MD5
79a91678871942f25e9c766039609a43
-
SHA1
4cabdd8b0b93e9c67b1a14e5aac9bcd870af096d
-
SHA256
ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03
-
SHA512
275b9aa4ee0a80be666b326669a039cacdc5fc51027e59def6d9d1cb6d5e529847a8ba349c68a5b5ba9067ef9ad65f20624c184c36c7be1e13c5bf4879ff8a99
-
SSDEEP
24576:Jme2yL1JdKheEsugptvNuBuaCblrrv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:JtTLXdceb9XvNzaw9jLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.atikol.cam - Port:
21 - Username:
[email protected] - Password:
!L4!S@!C5kOUt88
Targets
-
-
Target
ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03
-
Size
1.5MB
-
MD5
79a91678871942f25e9c766039609a43
-
SHA1
4cabdd8b0b93e9c67b1a14e5aac9bcd870af096d
-
SHA256
ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03
-
SHA512
275b9aa4ee0a80be666b326669a039cacdc5fc51027e59def6d9d1cb6d5e529847a8ba349c68a5b5ba9067ef9ad65f20624c184c36c7be1e13c5bf4879ff8a99
-
SSDEEP
24576:Jme2yL1JdKheEsugptvNuBuaCblrrv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:JtTLXdceb9XvNzaw9jLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-