General
-
Target
604d52dc3b6056ad0090d858a4ecae497fe1c0bfea2fd67576cfba4f389333f6.zip
-
Size
846KB
-
Sample
250107-ct9klazjfy
-
MD5
3fb192ad0a058bd5bae43fbbc5c4c614
-
SHA1
7c2fa2ed23a99a52e3df0df4c6fc04e77d76589a
-
SHA256
604d52dc3b6056ad0090d858a4ecae497fe1c0bfea2fd67576cfba4f389333f6
-
SHA512
1f05d29d4efc64a8cc4e377f7e6723f8b9fff0c826bdb1d5bd814ad9d951344524c126301beebaf9cb44c929f2a6504f4861682ef63d8998626b9ed6111e01b9
-
SSDEEP
24576:VWpzRLPfj0WH5QRUj7BmF33Ya4IfXRDWj:VWlpL/H7gh9Di
Behavioral task
behavioral1
Sample
SAL987656700.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
SAL987656700.exe
-
Size
871KB
-
MD5
a885a9c7468691538b78d54852b5a59c
-
SHA1
1b2340a366a6b28ac9d30f31bacef95afd0de595
-
SHA256
d2d196a12c822020c4042d607be77746951b6cb3c16201ff21ca8e9c5c786209
-
SHA512
903c918ef94c4dd9c8277c7cffe2774a26af285e1e41dcf71c5c3aee1fc65d1202a2eb227267bb044c050299acbfb67b970ca75e17f5da1fc48e89472f45173c
-
SSDEEP
12288:9sHzOUNUSB/o5LsI1uwajJ5yvv1l2lclTUX1MDc35Qx3tkscoP80In35zFYoRn33:UiUmSB/o5d1ubcv620n356C0IpZnJGO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-