General
-
Target
cca19643de6d16a67f7ecb13cd2bb8f9ed34dc352eb967250c3bd5c8bd09329c
-
Size
1.3MB
-
Sample
250107-bghexawqhs
-
MD5
680fd2015b9a8df73e541faf60e3cff2
-
SHA1
da9b83c61b06ce50083d5a765607ebf7164e8db9
-
SHA256
cca19643de6d16a67f7ecb13cd2bb8f9ed34dc352eb967250c3bd5c8bd09329c
-
SHA512
93bc0131b55deb14f66689f7f1010542de5e3550a0e3d1bf854528c7d6c7c09266bfb657d8f88152d46ede8ac942297f0e2bf3627ef462983c7e392621b7c74a
-
SSDEEP
24576:wqDEvCTbMWu7rQYlBQcBiT6rpFd+zmG0n356C0IpZnJGo:wTvC/MTQYxsWPkzmF3tJ
Static task
static1
Behavioral task
behavioral1
Sample
cca19643de6d16a67f7ecb13cd2bb8f9ed34dc352eb967250c3bd5c8bd09329c.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
cca19643de6d16a67f7ecb13cd2bb8f9ed34dc352eb967250c3bd5c8bd09329c
-
Size
1.3MB
-
MD5
680fd2015b9a8df73e541faf60e3cff2
-
SHA1
da9b83c61b06ce50083d5a765607ebf7164e8db9
-
SHA256
cca19643de6d16a67f7ecb13cd2bb8f9ed34dc352eb967250c3bd5c8bd09329c
-
SHA512
93bc0131b55deb14f66689f7f1010542de5e3550a0e3d1bf854528c7d6c7c09266bfb657d8f88152d46ede8ac942297f0e2bf3627ef462983c7e392621b7c74a
-
SSDEEP
24576:wqDEvCTbMWu7rQYlBQcBiT6rpFd+zmG0n356C0IpZnJGo:wTvC/MTQYxsWPkzmF3tJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-