General
-
Target
f1c4511b233b4db0e962affaef1b5c40857090ae742d86bf7ed81d6e2f0670eb
-
Size
210KB
-
Sample
250125-bdql4sypdm
-
MD5
baa04801e19bf9c54632466ba0173b68
-
SHA1
0c93e65e1842cde8b6eee58981a066413e2b6677
-
SHA256
f1c4511b233b4db0e962affaef1b5c40857090ae742d86bf7ed81d6e2f0670eb
-
SHA512
3c97d629e86117976a801a92bc807504854604a4494684b5117d40b7154bc2d602da9940404f01201ab711fa48344c3d79d84fe5741ee5537054aa21a07a33a7
-
SSDEEP
3072:6knVmI3b0mgfmWu+He9VOv5iG5sVhQ30Wk+70wgA11:6knV4e9VOvp
Static task
static1
Behavioral task
behavioral1
Sample
f1c4511b233b4db0e962affaef1b5c40857090ae742d86bf7ed81d6e2f0670eb.vbs
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.siscop.com.co - Port:
21 - Username:
[email protected] - Password:
+5s48Ia2&-(t
Targets
-
-
Target
f1c4511b233b4db0e962affaef1b5c40857090ae742d86bf7ed81d6e2f0670eb
-
Size
210KB
-
MD5
baa04801e19bf9c54632466ba0173b68
-
SHA1
0c93e65e1842cde8b6eee58981a066413e2b6677
-
SHA256
f1c4511b233b4db0e962affaef1b5c40857090ae742d86bf7ed81d6e2f0670eb
-
SHA512
3c97d629e86117976a801a92bc807504854604a4494684b5117d40b7154bc2d602da9940404f01201ab711fa48344c3d79d84fe5741ee5537054aa21a07a33a7
-
SSDEEP
3072:6knVmI3b0mgfmWu+He9VOv5iG5sVhQ30Wk+70wgA11:6knV4e9VOvp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-