General
-
Target
523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a.exe
-
Size
1.1MB
-
Sample
250111-dq5ynstncp
-
MD5
aa3e95c2cd9e5118dfe41280d0e05a49
-
SHA1
5261a60d04c74f986cdd6f129a171874b446d8b2
-
SHA256
523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a
-
SHA512
11564a40439aef33bcf205690bb18d4a29f995b4b063c6aea1e717a0e5334695c9d20875b686cfc29b03a8d545ffd370450c19acdbc174a008162e28e0d7e670
-
SSDEEP
24576:LRmJkcoQricOIQxiZY1WNy0NiyOPxaosPXuBDytC:IJZoQrbTFZY1WNyeQPxarPXI9
Static task
static1
Behavioral task
behavioral1
Sample
523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a.exe
-
Size
1.1MB
-
MD5
aa3e95c2cd9e5118dfe41280d0e05a49
-
SHA1
5261a60d04c74f986cdd6f129a171874b446d8b2
-
SHA256
523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a
-
SHA512
11564a40439aef33bcf205690bb18d4a29f995b4b063c6aea1e717a0e5334695c9d20875b686cfc29b03a8d545ffd370450c19acdbc174a008162e28e0d7e670
-
SSDEEP
24576:LRmJkcoQricOIQxiZY1WNy0NiyOPxaosPXuBDytC:IJZoQrbTFZY1WNyeQPxarPXI9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-