General
-
Target
2f4f19dbfa8271825a56f509f89769a007fb382a72b23b1cc4d57ce8148f1d16_NeikiAnalytics.exe
-
Size
583KB
-
Sample
240701-c5sffsxbnr
-
MD5
3bb08ad23a8e347f28f8c0b9a26d4af0
-
SHA1
619723fafc56d38b67a94b4278692fa2dfc2deda
-
SHA256
2f4f19dbfa8271825a56f509f89769a007fb382a72b23b1cc4d57ce8148f1d16
-
SHA512
286915c68eb5387a2f988beec7d17f2b087296a6562512ffe70e5dc86f8f530db3bd588ba9d9e0f5b2269afe839311dcfe8da644e495f6dc1eb6d93332e672ac
-
SSDEEP
12288:qYV6MorX7qzuC3QHO9FQVHPF51jgcd20mS+lX1qroxNEyu:ZBXu9HGaVHXm1XErox6D
Behavioral task
behavioral1
Sample
2f4f19dbfa8271825a56f509f89769a007fb382a72b23b1cc4d57ce8148f1d16_NeikiAnalytics.exe
Resource
win7-20240611-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
2f4f19dbfa8271825a56f509f89769a007fb382a72b23b1cc4d57ce8148f1d16_NeikiAnalytics.exe
-
Size
583KB
-
MD5
3bb08ad23a8e347f28f8c0b9a26d4af0
-
SHA1
619723fafc56d38b67a94b4278692fa2dfc2deda
-
SHA256
2f4f19dbfa8271825a56f509f89769a007fb382a72b23b1cc4d57ce8148f1d16
-
SHA512
286915c68eb5387a2f988beec7d17f2b087296a6562512ffe70e5dc86f8f530db3bd588ba9d9e0f5b2269afe839311dcfe8da644e495f6dc1eb6d93332e672ac
-
SSDEEP
12288:qYV6MorX7qzuC3QHO9FQVHPF51jgcd20mS+lX1qroxNEyu:ZBXu9HGaVHXm1XErox6D
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-