General
-
Target
a8644197f21de0be68163e7cb5236cdce1fe5c6c51135657b6ab6ce9b3f61b9c
-
Size
824KB
-
Sample
250124-bjz3qsslav
-
MD5
879db61c2d268fddfe7c404b73d98ab0
-
SHA1
a4dd97f956ef2ab80ce7ccde0074709956ef3ac0
-
SHA256
a8644197f21de0be68163e7cb5236cdce1fe5c6c51135657b6ab6ce9b3f61b9c
-
SHA512
5f7e8f5e6bd440f4ee88ef23d9191759cc68134b061097bcfab231853ab43bd1484e5987af1854400ef5dcefe80285ab5c3ab651b8bba3c1db5640abe923b8b1
-
SSDEEP
12288:46Wq4aaE6KwyF5L0Y2D1PqLZXDnsFswVZHKGHOtOGsB34KnszWOL9kLosHiRzNn:OthEVaPqLZX7Ss0ZH9dGsBIKn8OoNZNn
Behavioral task
behavioral1
Sample
a8644197f21de0be68163e7cb5236cdce1fe5c6c51135657b6ab6ce9b3f61b9c.exe
Resource
win7-20241023-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Targets
-
-
Target
a8644197f21de0be68163e7cb5236cdce1fe5c6c51135657b6ab6ce9b3f61b9c
-
Size
824KB
-
MD5
879db61c2d268fddfe7c404b73d98ab0
-
SHA1
a4dd97f956ef2ab80ce7ccde0074709956ef3ac0
-
SHA256
a8644197f21de0be68163e7cb5236cdce1fe5c6c51135657b6ab6ce9b3f61b9c
-
SHA512
5f7e8f5e6bd440f4ee88ef23d9191759cc68134b061097bcfab231853ab43bd1484e5987af1854400ef5dcefe80285ab5c3ab651b8bba3c1db5640abe923b8b1
-
SSDEEP
12288:46Wq4aaE6KwyF5L0Y2D1PqLZXDnsFswVZHKGHOtOGsB34KnszWOL9kLosHiRzNn:OthEVaPqLZX7Ss0ZH9dGsBIKn8OoNZNn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-