General
-
Target
444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d
-
Size
1.1MB
-
Sample
250129-br7sjszkbm
-
MD5
1f383b406074c2253d0e4a979703540d
-
SHA1
246c5ad4c8c719e430509dd7023536759cc2af6a
-
SHA256
444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d
-
SHA512
32b38a211f0abb8c68c93888ed8fa4234ff9e35073b94f4d8d665d82459bd6da15c0504d29728ea6bbfd6a4abd0e07ab538b2237800b85ae5624bf223a1d8ba9
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1WNQKlrjlg3p2JGLNx7qqN2O88:7JZoQrbTFZY1WNQKzg3p2cLNxuqoO9
Static task
static1
Behavioral task
behavioral1
Sample
444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d
-
Size
1.1MB
-
MD5
1f383b406074c2253d0e4a979703540d
-
SHA1
246c5ad4c8c719e430509dd7023536759cc2af6a
-
SHA256
444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d
-
SHA512
32b38a211f0abb8c68c93888ed8fa4234ff9e35073b94f4d8d665d82459bd6da15c0504d29728ea6bbfd6a4abd0e07ab538b2237800b85ae5624bf223a1d8ba9
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1WNQKlrjlg3p2JGLNx7qqN2O88:7JZoQrbTFZY1WNQKzg3p2cLNxuqoO9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-