General
-
Target
da57909cc8d92b09f517ec300581fcdb9bfab764e276f71c48262fb19bb212a6
-
Size
629KB
-
Sample
240630-bc4scavbln
-
MD5
1f2c3cb26dfc2466cd01f591170ef5db
-
SHA1
09fea3e47a55edd8b4041783d29df68c7568d6df
-
SHA256
da57909cc8d92b09f517ec300581fcdb9bfab764e276f71c48262fb19bb212a6
-
SHA512
cb1fc2fc3c9e7c94e9bf2f826fc01cce7e0e56b32248cf9e309b508fa255bf63a01c1453dc0bb5a6ce36f78b39755faecff961908f9abd8b0ac8b30e94e10027
-
SSDEEP
12288:B5kndms6zEiPReuXvic88+kVkYkudLhjrceONM3YuX/dFfNHW:4nglp5euF8p85zhUeOGR/d1NH
Static task
static1
Behavioral task
behavioral1
Sample
da57909cc8d92b09f517ec300581fcdb9bfab764e276f71c48262fb19bb212a6.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
da57909cc8d92b09f517ec300581fcdb9bfab764e276f71c48262fb19bb212a6.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://mail.hearing-vision.com - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!
Extracted
Protocol: ftp- Host:
mail.hearing-vision.com - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!
Targets
-
-
Target
da57909cc8d92b09f517ec300581fcdb9bfab764e276f71c48262fb19bb212a6
-
Size
629KB
-
MD5
1f2c3cb26dfc2466cd01f591170ef5db
-
SHA1
09fea3e47a55edd8b4041783d29df68c7568d6df
-
SHA256
da57909cc8d92b09f517ec300581fcdb9bfab764e276f71c48262fb19bb212a6
-
SHA512
cb1fc2fc3c9e7c94e9bf2f826fc01cce7e0e56b32248cf9e309b508fa255bf63a01c1453dc0bb5a6ce36f78b39755faecff961908f9abd8b0ac8b30e94e10027
-
SSDEEP
12288:B5kndms6zEiPReuXvic88+kVkYkudLhjrceONM3YuX/dFfNHW:4nglp5euF8p85zhUeOGR/d1NH
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-