General
-
Target
rOC129075-JG-3229.exe
-
Size
1.0MB
-
Sample
250328-xnsp4szwcx
-
MD5
ca05eaa8df0531cb2f76d5a2baa5aaea
-
SHA1
688adb6f0a0ab7f13d47d0c16326221e20fa7b10
-
SHA256
66d7d602350b27bd25ca73436b6b7598c65e5022cc8062eb5c87dc604ab97952
-
SHA512
3e59f0eefd60ac5783ab291e89484532f5bf6ab105f83a4f34099815b26375097cf984050f9b00e2c90631cb07b600aa18cba3b93f24b1f4e2d6447a1e7cfdf0
-
SSDEEP
24576:3u6J33O0c+JY5UZ+XC0kGso6Fai9OXAa38dIApWY:Ru0c++OCvkGs9FaizxIJY
Static task
static1
Behavioral task
behavioral1
Sample
rOC129075-JG-3229.exe
Resource
win7-20241023-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Targets
-
-
Target
rOC129075-JG-3229.exe
-
Size
1.0MB
-
MD5
ca05eaa8df0531cb2f76d5a2baa5aaea
-
SHA1
688adb6f0a0ab7f13d47d0c16326221e20fa7b10
-
SHA256
66d7d602350b27bd25ca73436b6b7598c65e5022cc8062eb5c87dc604ab97952
-
SHA512
3e59f0eefd60ac5783ab291e89484532f5bf6ab105f83a4f34099815b26375097cf984050f9b00e2c90631cb07b600aa18cba3b93f24b1f4e2d6447a1e7cfdf0
-
SSDEEP
24576:3u6J33O0c+JY5UZ+XC0kGso6Fai9OXAa38dIApWY:Ru0c++OCvkGs9FaizxIJY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-