General
-
Target
aac970bdcfa017c63b3a5dbef151cd8e0f3ba5abc0b21b18294b9847d947bd7f
-
Size
239KB
-
Sample
241221-bjzrzaylg1
-
MD5
0be19c041453cec8566a4743e23402b6
-
SHA1
00b910f1cf6d75cd96906b5eff9ecf8b61226eec
-
SHA256
aac970bdcfa017c63b3a5dbef151cd8e0f3ba5abc0b21b18294b9847d947bd7f
-
SHA512
dbfc0acf03d0136a63befd444c6ee144977dd63a7a05e6107915779d5b72b3365abc91b95ab41ca001b3f2ccbab05c69ae2bd6c12687f660dbd8bf604e941659
-
SSDEEP
3072:JxN3NB1x9xCxSW2MqnNLZ7UtbvDK59uW58UGQl:tNB1x9xCxSW2MqNLZ7YbvDi35lj
Behavioral task
behavioral1
Sample
aac970bdcfa017c63b3a5dbef151cd8e0f3ba5abc0b21b18294b9847d947bd7f.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Extracted
Protocol: ftp- Host:
ftp.antoniomayol.com - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
aac970bdcfa017c63b3a5dbef151cd8e0f3ba5abc0b21b18294b9847d947bd7f
-
Size
239KB
-
MD5
0be19c041453cec8566a4743e23402b6
-
SHA1
00b910f1cf6d75cd96906b5eff9ecf8b61226eec
-
SHA256
aac970bdcfa017c63b3a5dbef151cd8e0f3ba5abc0b21b18294b9847d947bd7f
-
SHA512
dbfc0acf03d0136a63befd444c6ee144977dd63a7a05e6107915779d5b72b3365abc91b95ab41ca001b3f2ccbab05c69ae2bd6c12687f660dbd8bf604e941659
-
SSDEEP
3072:JxN3NB1x9xCxSW2MqnNLZ7UtbvDK59uW58UGQl:tNB1x9xCxSW2MqNLZ7YbvDi35lj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-