General
-
Target
73b8a2fd3dd6b8966abda445e9d322dea069df2a357d9dbd81f683e4c4065529
-
Size
788KB
-
Sample
240924-tjfcfascjr
-
MD5
f1141dc611fae8a5a6c42fc3f6d80a1a
-
SHA1
751178098a65c96a0dd1df0187d7bbf156231ffe
-
SHA256
73b8a2fd3dd6b8966abda445e9d322dea069df2a357d9dbd81f683e4c4065529
-
SHA512
e46a32882981d229aba37c38d51aca591374decec5069abfb4adc14f25348580b34681048c577025bbdbeba2cca2bb22d22e8bdf2d2cc56884d43864aa3fb8a2
-
SSDEEP
24576:fEQyl8zfv2GjJmnE6QsxSc3zLYZPUIe8DBo9dpn:fCfqJmEBIS8zLYZPzt0j
Behavioral task
behavioral1
Sample
POYTR56789900.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
POYTR56789900.cmd
-
Size
802KB
-
MD5
2d0ad7779ec8291f001e3706a427b8ad
-
SHA1
904e520fbaa11abcd2906b68dfb85ecdb0069e55
-
SHA256
b3c8caa00c7ffb39c1602051d1f48105e223ee1da817e9b37bfea0f35e629b1b
-
SHA512
ac4c30e36944ea676ff4543c74f78f99b394d421933437a5202bd084875cc1b180226daf1df8f8f6c08b7c67f3c12bbb4053f6429a8337b1ea825dda32bef80a
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLmHRc3JalaLLW+ITJ3UiEGE3Gt3FoppG/i4BoPLppz:tthEVaPqL2c3rLSTJuWcgpBoP9pz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-