General
-
Target
4b1f40950e46411177a5328d583ec43c87e76804e7c40d659d907aaad15dedb2
-
Size
531KB
-
Sample
240728-bfm9rsyfmp
-
MD5
edc1f5bc842a10d9e3c961a6b3ea316b
-
SHA1
93e825ab954bdbe8bae666c7c20c8c38986fcee3
-
SHA256
4b1f40950e46411177a5328d583ec43c87e76804e7c40d659d907aaad15dedb2
-
SHA512
a20d0a4e5022f31401d2f30d5304790c1c54aa61354e137c2d1f97540c5711ec5d06e0beb7c5fc4849931c58ac74ea074d8ba5dc82887867d5b182b8cb665095
-
SSDEEP
12288:yYV6MorX7qzuC3QHO9FQVHPF51jgcgGKR0BOMEagNM2zDc:BBXu9HGaVHzK00uePc
Behavioral task
behavioral1
Sample
4b1f40950e46411177a5328d583ec43c87e76804e7c40d659d907aaad15dedb2.exe
Resource
win7-20240704-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
4b1f40950e46411177a5328d583ec43c87e76804e7c40d659d907aaad15dedb2
-
Size
531KB
-
MD5
edc1f5bc842a10d9e3c961a6b3ea316b
-
SHA1
93e825ab954bdbe8bae666c7c20c8c38986fcee3
-
SHA256
4b1f40950e46411177a5328d583ec43c87e76804e7c40d659d907aaad15dedb2
-
SHA512
a20d0a4e5022f31401d2f30d5304790c1c54aa61354e137c2d1f97540c5711ec5d06e0beb7c5fc4849931c58ac74ea074d8ba5dc82887867d5b182b8cb665095
-
SSDEEP
12288:yYV6MorX7qzuC3QHO9FQVHPF51jgcgGKR0BOMEagNM2zDc:BBXu9HGaVHzK00uePc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-