General
-
Target
97a8bf73809611ee4048adc2714685bd29bba3e677f5589b1053e30e0d98cf53.exe
-
Size
590KB
-
Sample
250110-r6hpzazlgn
-
MD5
b12b444b2a02c69499aed36944384160
-
SHA1
69c880815225de5db3927af16727020cc9d563d5
-
SHA256
97a8bf73809611ee4048adc2714685bd29bba3e677f5589b1053e30e0d98cf53
-
SHA512
82731330e96bfbe9d151e70a9263e1e9444b2f9447d17fa33281177ac752724dc25fa58f7b64c05a4ffeae372d2009457b6778ad4a90deaac3f7d92ccc6a07cb
-
SSDEEP
12288:2quErHF6xC9D6DmR1J98w4oknqOOCyQfc8KeXMV7d/AhbUnWfW:7rl6kD68JmlotQfjXcV7B0bUWe
Behavioral task
behavioral1
Sample
97a8bf73809611ee4048adc2714685bd29bba3e677f5589b1053e30e0d98cf53.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
97a8bf73809611ee4048adc2714685bd29bba3e677f5589b1053e30e0d98cf53.exe
-
Size
590KB
-
MD5
b12b444b2a02c69499aed36944384160
-
SHA1
69c880815225de5db3927af16727020cc9d563d5
-
SHA256
97a8bf73809611ee4048adc2714685bd29bba3e677f5589b1053e30e0d98cf53
-
SHA512
82731330e96bfbe9d151e70a9263e1e9444b2f9447d17fa33281177ac752724dc25fa58f7b64c05a4ffeae372d2009457b6778ad4a90deaac3f7d92ccc6a07cb
-
SSDEEP
12288:2quErHF6xC9D6DmR1J98w4oknqOOCyQfc8KeXMV7d/AhbUnWfW:7rl6kD68JmlotQfjXcV7B0bUWe
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-