General
-
Target
3fb192ad0a058bd5bae43fbbc5c4c614.bin
-
Size
846KB
-
Sample
250108-bldmhsxmdt
-
MD5
df784ba65515613ad237193e65432483
-
SHA1
db4f0a9f195563941cc8125e41ec40a080991e84
-
SHA256
23e75ec66a6089a8e0355784dc0e86a43d510d929329ef325f9b8e7de1469ae9
-
SHA512
84134cecf89809cc3cadfa896b2ed0294927f28c474a142b6a6c38c8aa560e19d04971e681057d241617f1e1f40d2355e02ab0ef971063ba58e270ac400b5583
-
SSDEEP
24576:Nd459mGAGuNwNxB6ChomiJ8TwIzo6tzBs96qs8:4uGcNwXZYQPtyQ0
Behavioral task
behavioral1
Sample
SAL987656700.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
SAL987656700.exe
-
Size
871KB
-
MD5
a885a9c7468691538b78d54852b5a59c
-
SHA1
1b2340a366a6b28ac9d30f31bacef95afd0de595
-
SHA256
d2d196a12c822020c4042d607be77746951b6cb3c16201ff21ca8e9c5c786209
-
SHA512
903c918ef94c4dd9c8277c7cffe2774a26af285e1e41dcf71c5c3aee1fc65d1202a2eb227267bb044c050299acbfb67b970ca75e17f5da1fc48e89472f45173c
-
SSDEEP
12288:9sHzOUNUSB/o5LsI1uwajJ5yvv1l2lclTUX1MDc35Qx3tkscoP80In35zFYoRn33:UiUmSB/o5d1ubcv620n356C0IpZnJGO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-