General
-
Target
edbb67d7ff0eebc5dfee919d6524d555ce04864e3261ecf12af1b6ea05c10f0d
-
Size
864KB
-
Sample
250123-jrsbvs1pej
-
MD5
40d8666ec301b58ec84d71d132b70a02
-
SHA1
afdf5ee0f0ed22404045ec3b57f0b0c597bb1c69
-
SHA256
edbb67d7ff0eebc5dfee919d6524d555ce04864e3261ecf12af1b6ea05c10f0d
-
SHA512
4f0523a0e6b04d641a4ebc71d486178656c444b37109c732ded09b6af8a1724798722c10ba1a5fdc6a623911dedd784fdd6d554dd13973de5afd72b58d2a806e
-
SSDEEP
24576:e7kOqWKoqnUlKv51l97Jh2u/7o4CFpHmw/+vzmX6:eICK/nBBvZk4emUEe6
Static task
static1
Behavioral task
behavioral1
Sample
MACHINE QUOTATION.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MACHINE QUOTATION.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Targets
-
-
Target
MACHINE QUOTATION.exe
-
Size
1.2MB
-
MD5
6373a333313ed5bbf4ed81c1c609ff5e
-
SHA1
79c0d2304c0d4e2163ed4e6fb15500f330d3a3e4
-
SHA256
75fde62955120651791091525d40b552f763930e9e9a81199ea8a99a9c67d683
-
SHA512
eb39258cd4684fa9b8941ac13a019e9e630f0333ba51385a68c18ee8f04cb30e06c256f67b2da2dfbc0902acc64ffca282b9de550bd3fe1f4b6129de810dd78e
-
SSDEEP
24576:KRmJkcoQricOIQxiZY1ia23X3tf58Bbu9yS5AMiODrc7fKBB20R4+:PJZoQrbTFZY1ia2H3tf29uEr7fn+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-