General
-
Target
d2b275edfe93caf7e90362a513f00ffec34f1b10df49d950db008a3417045311.exe
-
Size
586KB
-
Sample
250111-f1mwysylfn
-
MD5
7bea2772a00141a510d2b2e2367597e1
-
SHA1
1d38623ab62345c2d9f9f79b9f50849bbf9392ef
-
SHA256
d2b275edfe93caf7e90362a513f00ffec34f1b10df49d950db008a3417045311
-
SHA512
059070ca0a65c1f3c269328e9cc0831f3beec68cbe0e98be4656913296747947182d55aaf7fd14e8553edcbbaf2550570e9d19c800852ce1b5e8ac8107fe921c
-
SSDEEP
12288:vquErHF6xC9D6DmR1J98w4oknqOOCyQfIwKT8bTgJp4pDVOPlDaZ:2rl6kD68JmlotQfET8bk+84
Behavioral task
behavioral1
Sample
d2b275edfe93caf7e90362a513f00ffec34f1b10df49d950db008a3417045311.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
d2b275edfe93caf7e90362a513f00ffec34f1b10df49d950db008a3417045311.exe
-
Size
586KB
-
MD5
7bea2772a00141a510d2b2e2367597e1
-
SHA1
1d38623ab62345c2d9f9f79b9f50849bbf9392ef
-
SHA256
d2b275edfe93caf7e90362a513f00ffec34f1b10df49d950db008a3417045311
-
SHA512
059070ca0a65c1f3c269328e9cc0831f3beec68cbe0e98be4656913296747947182d55aaf7fd14e8553edcbbaf2550570e9d19c800852ce1b5e8ac8107fe921c
-
SSDEEP
12288:vquErHF6xC9D6DmR1J98w4oknqOOCyQfIwKT8bTgJp4pDVOPlDaZ:2rl6kD68JmlotQfET8bk+84
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-