General
-
Target
bbb9c37d643e6302bb92445338abeaa909ceea85994a30baf205cdbb9ebbaa05
-
Size
531KB
-
Sample
241226-bktx4stjas
-
MD5
7d5a73279a1b21f6c74453b1435b6188
-
SHA1
3a3d443a962ced3dbd4376f7ef070d2dd117c97e
-
SHA256
bbb9c37d643e6302bb92445338abeaa909ceea85994a30baf205cdbb9ebbaa05
-
SHA512
519a9d56b3ac712600c84e8fab212e318afc24f64177019c696bf7bcf6cf4c70963c42861b5253fd2a9a2b4e2e9ee72ec1073df77876390d6d0748836836dcc4
-
SSDEEP
12288:4quErHF6xC9D6DmR1J98w4oknqOOCyQfUYfp4IAgjNX3N8L:5rl6kD68JmlotQfTp1AgjNX96
Behavioral task
behavioral1
Sample
bbb9c37d643e6302bb92445338abeaa909ceea85994a30baf205cdbb9ebbaa05.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Targets
-
-
Target
bbb9c37d643e6302bb92445338abeaa909ceea85994a30baf205cdbb9ebbaa05
-
Size
531KB
-
MD5
7d5a73279a1b21f6c74453b1435b6188
-
SHA1
3a3d443a962ced3dbd4376f7ef070d2dd117c97e
-
SHA256
bbb9c37d643e6302bb92445338abeaa909ceea85994a30baf205cdbb9ebbaa05
-
SHA512
519a9d56b3ac712600c84e8fab212e318afc24f64177019c696bf7bcf6cf4c70963c42861b5253fd2a9a2b4e2e9ee72ec1073df77876390d6d0748836836dcc4
-
SSDEEP
12288:4quErHF6xC9D6DmR1J98w4oknqOOCyQfUYfp4IAgjNX3N8L:5rl6kD68JmlotQfTp1AgjNX96
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-