General
-
Target
344cee3534296bfa8f7c3d6a2ec62d91e0c24c36493a6680dc12b3a16a593df2
-
Size
638KB
-
Sample
241014-xwlxjavgpr
-
MD5
e6eb5738b057050d55b6cf696e28e545
-
SHA1
2921e57b21c589b6dfc3d298e964f51544970999
-
SHA256
344cee3534296bfa8f7c3d6a2ec62d91e0c24c36493a6680dc12b3a16a593df2
-
SHA512
0fa5df513b4cd6bf9c9a95c0b1ac4ad414d4630d19c77000b0e56b10a775979ec94c3374b2003ba5e68cd95c2241917cffdee44b20ee665fcf22e1d5d425bddd
-
SSDEEP
12288:Pw0DonKLgSqqYSUdNljNNPN5l2svMlfLtd3jq0KjCSAXhBYT:RmqYVdN5NFNFQ3ONAR
Static task
static1
Behavioral task
behavioral1
Sample
344cee3534296bfa8f7c3d6a2ec62d91e0c24c36493a6680dc12b3a16a593df2.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Extracted
Protocol: ftp- Host:
ftp.antoniomayol.com - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
344cee3534296bfa8f7c3d6a2ec62d91e0c24c36493a6680dc12b3a16a593df2
-
Size
638KB
-
MD5
e6eb5738b057050d55b6cf696e28e545
-
SHA1
2921e57b21c589b6dfc3d298e964f51544970999
-
SHA256
344cee3534296bfa8f7c3d6a2ec62d91e0c24c36493a6680dc12b3a16a593df2
-
SHA512
0fa5df513b4cd6bf9c9a95c0b1ac4ad414d4630d19c77000b0e56b10a775979ec94c3374b2003ba5e68cd95c2241917cffdee44b20ee665fcf22e1d5d425bddd
-
SSDEEP
12288:Pw0DonKLgSqqYSUdNljNNPN5l2svMlfLtd3jq0KjCSAXhBYT:RmqYVdN5NFNFQ3ONAR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-