General
-
Target
qcfk71.ps1
-
Size
883KB
-
Sample
250113-rc9atsvjg1
-
MD5
59b52c8f84fe2c3ad0dbf846458a8b0e
-
SHA1
d0f7133d12e764781faf7c333f1ba115a7dc29ae
-
SHA256
635bd1a6aed07ec24ab3cef313535757da24d25a6525e0b172ac943ed43ecd55
-
SHA512
6a369dc696f5c7569bcf86e4e689985fd6ae21fdfd082da82a73c2647e046a5decb963d1864e5a5c891dee9e7b54480834004f83bc20413e48f6e6f7f8372106
-
SSDEEP
24576:CZPsiow8xKQ3FuIHIrR2D8+NyzIX6ynYyHPdZoo6ukNoTn1lhie:CZPs68xH8IHIrR48+N7X6crHV6LNoTnV
Static task
static1
Behavioral task
behavioral1
Sample
qcfk71.ps1
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
qcfk71.ps1
-
Size
883KB
-
MD5
59b52c8f84fe2c3ad0dbf846458a8b0e
-
SHA1
d0f7133d12e764781faf7c333f1ba115a7dc29ae
-
SHA256
635bd1a6aed07ec24ab3cef313535757da24d25a6525e0b172ac943ed43ecd55
-
SHA512
6a369dc696f5c7569bcf86e4e689985fd6ae21fdfd082da82a73c2647e046a5decb963d1864e5a5c891dee9e7b54480834004f83bc20413e48f6e6f7f8372106
-
SSDEEP
24576:CZPsiow8xKQ3FuIHIrR2D8+NyzIX6ynYyHPdZoo6ukNoTn1lhie:CZPs68xH8IHIrR48+N7X6crHV6LNoTnV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-