General
-
Target
2d83f55e635f187273043e55b26141b397af08aaee2d7baf891c212426828312
-
Size
800KB
-
Sample
250125-bj9l6syrhn
-
MD5
c2d815917f61f63e3a3ba2b2d5b08525
-
SHA1
5b9b60c3ef7d5ad4d9fc6ae2698fd5217968f917
-
SHA256
2d83f55e635f187273043e55b26141b397af08aaee2d7baf891c212426828312
-
SHA512
3e9ae0cbdd0e2b7665f62c231c616968987207a2c5bec284d8e790f930fb123d75655388bdb3d6815b9ca7662946958de86373c5f1e94c9e24030881f4891395
-
SSDEEP
24576:lVcneNZ10AJC3SDFw/SDVhjkDaMbbOUboCuweAY1Q6Nbx/1VW:gmyiFDnjkDDid8Y151Hc
Static task
static1
Behavioral task
behavioral1
Sample
OC GDL48940.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Targets
-
-
Target
OC GDL48940.exe
-
Size
1.2MB
-
MD5
bc4193c8697c930516e7f8a0b455efd4
-
SHA1
8c949a64324491d76e0ff216dda5864d4fda874d
-
SHA256
5420f805940014cf9e51372725194209e75017aaa65c73673ceab6751784fe1d
-
SHA512
90d79ee2ce69c3cafb13bc319abe940267a3f5bb5c096bb16cce8b9a4cdc0e6c7fa2a347ee5b6608589fb9ee8c2c973f596bf520b88df0dd39fbb8088fb952f0
-
SSDEEP
24576:IRmJkcoQricOIQxiZY1ia/FyzVpd944CPkjgdlMMpFV:tJZoQrbTFZY1ia/F2/Br8lMMFV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-