General
-
Target
44f3e7854ea6963412d6040957bfc7f8b753858abf9a0b84be9d8068463209ff
-
Size
979KB
-
Sample
221007-lky7yaccej
-
MD5
62aa2ba22a447fb2b167cc65732ceeab
-
SHA1
ead9b7a1fdad674dcfdcd539cf07176d51bdf6bf
-
SHA256
44f3e7854ea6963412d6040957bfc7f8b753858abf9a0b84be9d8068463209ff
-
SHA512
544a44a6de876e4a4676ac75d03677145b4c82abd6efee7a8e738e6f94d297c14dd8cb7a1d992f824985a57db9e86769b4761adcbeacc2fd108e88c9f61e5896
-
SSDEEP
12288:f2iNtJ2uteZsTOgXFyYyBBf2LVRw5sjno0lldYI:f1MWeZs/XFABBf2LVxjoS7YI
Static task
static1
Behavioral task
behavioral1
Sample
44f3e7854ea6963412d6040957bfc7f8b753858abf9a0b84be9d8068463209ff.exe
Resource
win10-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl/ - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
44f3e7854ea6963412d6040957bfc7f8b753858abf9a0b84be9d8068463209ff
-
Size
979KB
-
MD5
62aa2ba22a447fb2b167cc65732ceeab
-
SHA1
ead9b7a1fdad674dcfdcd539cf07176d51bdf6bf
-
SHA256
44f3e7854ea6963412d6040957bfc7f8b753858abf9a0b84be9d8068463209ff
-
SHA512
544a44a6de876e4a4676ac75d03677145b4c82abd6efee7a8e738e6f94d297c14dd8cb7a1d992f824985a57db9e86769b4761adcbeacc2fd108e88c9f61e5896
-
SSDEEP
12288:f2iNtJ2uteZsTOgXFyYyBBf2LVRw5sjno0lldYI:f1MWeZs/XFABBf2LVxjoS7YI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-