General
-
Target
79298ce979a88b5476b34311d505eb7ac2de50f2fa6f40ad4d5a723499180511
-
Size
1.0MB
-
Sample
250111-bndejayqcq
-
MD5
7050ed6c98a8bf4492abfe6d7739a43a
-
SHA1
4f5e78b6f75de1807f9caf42c4be91e9180cadf2
-
SHA256
79298ce979a88b5476b34311d505eb7ac2de50f2fa6f40ad4d5a723499180511
-
SHA512
3c06cbaae8f03a79c27297b8c5740663a06f5dab30b051b21d2c43f4f2803c70f14f3bb48c74e385c77bbd04b83fdcd5fcb8008032e04aa997eed7e2090c83a0
-
SSDEEP
24576:mu6J33O0c+JY5UZ+XC0kGsoTCcitXcV7B0bUWFtWY:ou0c++OCvkGsECcitX03WKY
Static task
static1
Behavioral task
behavioral1
Sample
79298ce979a88b5476b34311d505eb7ac2de50f2fa6f40ad4d5a723499180511.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
79298ce979a88b5476b34311d505eb7ac2de50f2fa6f40ad4d5a723499180511
-
Size
1.0MB
-
MD5
7050ed6c98a8bf4492abfe6d7739a43a
-
SHA1
4f5e78b6f75de1807f9caf42c4be91e9180cadf2
-
SHA256
79298ce979a88b5476b34311d505eb7ac2de50f2fa6f40ad4d5a723499180511
-
SHA512
3c06cbaae8f03a79c27297b8c5740663a06f5dab30b051b21d2c43f4f2803c70f14f3bb48c74e385c77bbd04b83fdcd5fcb8008032e04aa997eed7e2090c83a0
-
SSDEEP
24576:mu6J33O0c+JY5UZ+XC0kGsoTCcitXcV7B0bUWFtWY:ou0c++OCvkGsECcitX03WKY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-