General
-
Target
382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d
-
Size
1012KB
-
Sample
250111-bnb7gawqcx
-
MD5
bc7fee37d8d779b635750bce96b9ecd9
-
SHA1
7ea7eb2001c6a29d93f2d780dbf2ef37070689be
-
SHA256
382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d
-
SHA512
1fcafcd2fc26508f1c18d5261cfad45a43b98dc6bb67665c8c3d89af120cb1eaad7204b46901424927f034ff3f9e8f72724bd3a5250e79c7ec5457ecfd6eb70e
-
SSDEEP
12288:Jtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNDPPpHrYPTYC2ajbP50s3o32VV6:Jtb20pkaCqT5TBWgNjVYrpv13G+V6A
Static task
static1
Behavioral task
behavioral1
Sample
382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d
-
Size
1012KB
-
MD5
bc7fee37d8d779b635750bce96b9ecd9
-
SHA1
7ea7eb2001c6a29d93f2d780dbf2ef37070689be
-
SHA256
382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d
-
SHA512
1fcafcd2fc26508f1c18d5261cfad45a43b98dc6bb67665c8c3d89af120cb1eaad7204b46901424927f034ff3f9e8f72724bd3a5250e79c7ec5457ecfd6eb70e
-
SSDEEP
12288:Jtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNDPPpHrYPTYC2ajbP50s3o32VV6:Jtb20pkaCqT5TBWgNjVYrpv13G+V6A
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-