General
-
Target
8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe
-
Size
784KB
-
Sample
250122-g95zkatken
-
MD5
e85120ae6e26e400b9e04147908c93f0
-
SHA1
16deafd5efffab3135f85b964a869d84dca61b45
-
SHA256
8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d
-
SHA512
7a14036c9dbc36caf62c00add3d88395256d10abee68759856a896609526acd8c185a3eef9d528b61eeac0b76335f9360388c66df52449e8d1fba373d8e4cd33
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqL0/h7xmPBBAYu9QSUVMvYGSR1VLprLwuiCpcgzR7hY:tthEVaPqLsrgYYBSUevvW13LTX17hSh/
Behavioral task
behavioral1
Sample
8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe
-
Size
784KB
-
MD5
e85120ae6e26e400b9e04147908c93f0
-
SHA1
16deafd5efffab3135f85b964a869d84dca61b45
-
SHA256
8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d
-
SHA512
7a14036c9dbc36caf62c00add3d88395256d10abee68759856a896609526acd8c185a3eef9d528b61eeac0b76335f9360388c66df52449e8d1fba373d8e4cd33
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqL0/h7xmPBBAYu9QSUVMvYGSR1VLprLwuiCpcgzR7hY:tthEVaPqLsrgYYBSUevvW13LTX17hSh/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-