General
-
Target
702bfa8f5e655b8e697c0da0fe6ef8d381ddc9ee9f8fdb75b4fdddf19c30758a
-
Size
777KB
-
Sample
240926-eawwhayepb
-
MD5
30a08022859dbb5fe74bf169c5a1db1c
-
SHA1
036e2e931c1154d00df36b6f697af3519bcd2dd2
-
SHA256
702bfa8f5e655b8e697c0da0fe6ef8d381ddc9ee9f8fdb75b4fdddf19c30758a
-
SHA512
cee317178a8d34a25c3ca89f033fd4582459ffb880b820d3f19bfe52ae19cba2a9f9ef8d1e88e3b90463def2d4d15c5cc48c5fdc29ea52d2239d51878af1e684
-
SSDEEP
24576:cEQyl8zfv2GjJmnE1VVxuOHH/g2HIDN5GVdA/dXs0ghv:cCfqJmEHVxVHI2Hcbwyhv4
Behavioral task
behavioral1
Sample
UAE7890-0987654.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
UAE7890-0987654.cmd
-
Size
792KB
-
MD5
98078b4fc9598e0abf14580358bdb595
-
SHA1
7569139aa8940c37ee30425763a9225042c9bc4a
-
SHA256
be355266f38c5cddc82ad263354ea1de12ff6a9f8c008c412e22d94a30db6a84
-
SHA512
2591c7169791a7c8c875355c92add12eaca36509707404dd0dde22cbe752e96637384cf59b95b7df985abb86f8d0a727dc74bc18b69659c8ea7e1bb8846c7c8b
-
SSDEEP
24576:tthEVaPqLUgNxuELZ/u23IDHtoVJKzrJs02hb:VEVUc5NxHLA23cNqmFvS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-