General
-
Target
a60cf278af314c5950ff0e4f94f9915038c3f2582dc46782333cba764e0dacaa
-
Size
583KB
-
Sample
240320-b75ccsed7y
-
MD5
4414baebd8634b34f822bb4afc2378ed
-
SHA1
7a28187f4cb67e18e8ebdc2a38658541f30407d9
-
SHA256
a60cf278af314c5950ff0e4f94f9915038c3f2582dc46782333cba764e0dacaa
-
SHA512
580510f75d61df2c1c4c97ccd70e7bc332957bfa8b0d0306732d8002a4fdc0aefa16b4888b6761572c80a5cbe1466b6e884a61bceb98cd126baba19e61b8b970
-
SSDEEP
12288:9YV6MorX7qzuC3QHO9FQVHPF51jgcd3i6c/bCItCaHWikxm8M:SBXu9HGaVHI6cTntCaHWDJM
Behavioral task
behavioral1
Sample
a60cf278af314c5950ff0e4f94f9915038c3f2582dc46782333cba764e0dacaa.exe
Resource
win7-20240220-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
a60cf278af314c5950ff0e4f94f9915038c3f2582dc46782333cba764e0dacaa
-
Size
583KB
-
MD5
4414baebd8634b34f822bb4afc2378ed
-
SHA1
7a28187f4cb67e18e8ebdc2a38658541f30407d9
-
SHA256
a60cf278af314c5950ff0e4f94f9915038c3f2582dc46782333cba764e0dacaa
-
SHA512
580510f75d61df2c1c4c97ccd70e7bc332957bfa8b0d0306732d8002a4fdc0aefa16b4888b6761572c80a5cbe1466b6e884a61bceb98cd126baba19e61b8b970
-
SSDEEP
12288:9YV6MorX7qzuC3QHO9FQVHPF51jgcd3i6c/bCItCaHWikxm8M:SBXu9HGaVHI6cTntCaHWDJM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-