General
-
Target
4607df181c7ba5d22db44186f7c7b147394b0b1cd5e28d38d6aa2371e8f1dc61
-
Size
753KB
-
Sample
250118-bdv7layqbj
-
MD5
a25775d8a09644fdd5694feae6a4dde6
-
SHA1
3072306c0d9ab4aecf5c7bbb23f3f5f83cbb70cc
-
SHA256
4607df181c7ba5d22db44186f7c7b147394b0b1cd5e28d38d6aa2371e8f1dc61
-
SHA512
ef9418a26b2ecc7590dfb8864c7d5874a9b2804c215d33ba8878606f50bacda17500f266c6c8f7c72d96908f36747f505270279981916263ecb063111c2287fb
-
SSDEEP
12288:RHmV/54cNmO8sK1LOxrIFXDfDPYjXZV4GEJh/2IkauIJJWBxlemDcCjQNhr6yj61:RGVGcNeL1LA0VD09V4fGIIIPWBxzDhks
Behavioral task
behavioral1
Sample
OC 44076345.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Targets
-
-
Target
OC 44076345.exe
-
Size
834KB
-
MD5
be8f68c345d9f2f95d757df5bd331eaf
-
SHA1
f7818e339c05676f265ed085f57392875daebe13
-
SHA256
555c6eb8de554cac076806b73ce42e39f867a9801c6fcb944563d30cc1e049ed
-
SHA512
0c3b0c8d1110c7ae6f3df6a08fbfc38c263b00ef41c1121f76fdcf9ac525e7398fcc9911a2d117628277ac68bdf10040fa18f079178bc86764565253e65c8a80
-
SSDEEP
12288:46Wq4aaE6KwyF5L0Y2D1PqLrSKxsZJfUJt0Q2ikCj9g0UO899wt0V7U9eapvnMmG:OthEVaPqLrSKx530QZkVIYchpFXK7vuU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-