General
-
Target
0b36cd8b19057f3cdaaff1c857d07a5351e2c410772d154894a54d2fc3ab621a
-
Size
880KB
-
Sample
250124-d89dtayqer
-
MD5
7695837efba3682154ebfcf4485a4d88
-
SHA1
b38ba022f5d5a4c2b034c694becf0be50742e581
-
SHA256
0b36cd8b19057f3cdaaff1c857d07a5351e2c410772d154894a54d2fc3ab621a
-
SHA512
4a8cd1ca665329c3d7f6f46f4e3dac59004622b8654a50a6e82c39db1bd532b16c8f04cc8a2c5ca1694a9919824a17519640a66afa7757d8dc97ca0b2b6e1f0f
-
SSDEEP
12288:hCL8ZO8rXM3nq9S52zoqeWYZbBy7UblrC1ynq2Xf944VbsUyChUS1RkHLVNNhuSP:g7kOqWKoqnUltTfTbsUyuU2cLbXuVZA
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION#012325.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION#012325.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Targets
-
-
Target
QUOTATION#012325.exe
-
Size
1.2MB
-
MD5
18360b4431fb437521a2257734fede30
-
SHA1
d7d4686fc4f320c1535fed4ec1a3e4a185675d51
-
SHA256
1dad8b07c16757a4f505298e9fc7d6ae3dfa8f03ca9cdebf38dd47cc761287d5
-
SHA512
8750080ababf0f2812903b3f5baefe725b1a7907acd2f1989e474b007e3a087121335f4bae63ad6b6de65c5c6ad62f592da82ba5af5d0029cd7ce9320c9a453f
-
SSDEEP
24576:KRmJkcoQricOIQxiZY1ia23X3tfzfj4unHFObGJl:PJZoQrbTFZY1ia2H3tfzfj4unEGJl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-