General
-
Target
bc1bea4f587d11c75adde46b9a53d5cd33d22928f899eccd004f23754ce98303
-
Size
975KB
-
Sample
221026-wlq8tsgedn
-
MD5
cd9d173c47be216dbfc18aa88972cc7d
-
SHA1
620130b3213f5c636a3f3176697ac0b70ef366fd
-
SHA256
bc1bea4f587d11c75adde46b9a53d5cd33d22928f899eccd004f23754ce98303
-
SHA512
216bc84b8d542b0ac7187ffc91d09ec3beef432b3e52d0324742aee3b17d3142d87d54f146a90b175ed9dd524591217413d37b60d9fbd8fa4ce39e4e4ee39e55
-
SSDEEP
12288:oHDH/VsMkDvYHPCKTpKYq8nopsgPoauy3ViwFe+ZfBNpYLo0H9DI/GFlx/:s7VsDkqKl7znoTA0EwsCBNp8on/Wlx
Static task
static1
Behavioral task
behavioral1
Sample
bc1bea4f587d11c75adde46b9a53d5cd33d22928f899eccd004f23754ce98303.exe
Resource
win10-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl/ - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
bc1bea4f587d11c75adde46b9a53d5cd33d22928f899eccd004f23754ce98303
-
Size
975KB
-
MD5
cd9d173c47be216dbfc18aa88972cc7d
-
SHA1
620130b3213f5c636a3f3176697ac0b70ef366fd
-
SHA256
bc1bea4f587d11c75adde46b9a53d5cd33d22928f899eccd004f23754ce98303
-
SHA512
216bc84b8d542b0ac7187ffc91d09ec3beef432b3e52d0324742aee3b17d3142d87d54f146a90b175ed9dd524591217413d37b60d9fbd8fa4ce39e4e4ee39e55
-
SSDEEP
12288:oHDH/VsMkDvYHPCKTpKYq8nopsgPoauy3ViwFe+ZfBNpYLo0H9DI/GFlx/:s7VsDkqKl7znoTA0EwsCBNp8on/Wlx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-