General
-
Target
4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5.exe
-
Size
1.3MB
-
Sample
250121-dd7azasqc1
-
MD5
6a1679693ea637a2b65b965dd496d045
-
SHA1
282d192e2327fdcfd00ec6f217638a09e8ac3616
-
SHA256
4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5
-
SHA512
10684689d7bf46b98aee82b034cbba3f3fd647e1c662fec2a2c22bdfeae40006dd83bba29502ec7beb626557edec7ef53ff34a3561b0e634721e90fe66171002
-
SSDEEP
24576:7yaTivn9N/a/3Z67jWOO8Fv0Ojmxi0X5aCsyIh8LyKQ5vd95S:Waa9N/aPZajbO8FcOjxK1sOLyKQFH5
Static task
static1
Behavioral task
behavioral1
Sample
4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll650@@
Targets
-
-
Target
4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5.exe
-
Size
1.3MB
-
MD5
6a1679693ea637a2b65b965dd496d045
-
SHA1
282d192e2327fdcfd00ec6f217638a09e8ac3616
-
SHA256
4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5
-
SHA512
10684689d7bf46b98aee82b034cbba3f3fd647e1c662fec2a2c22bdfeae40006dd83bba29502ec7beb626557edec7ef53ff34a3561b0e634721e90fe66171002
-
SSDEEP
24576:7yaTivn9N/a/3Z67jWOO8Fv0Ojmxi0X5aCsyIh8LyKQ5vd95S:Waa9N/aPZajbO8FcOjxK1sOLyKQFH5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-