General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.27978.18935.exe
-
Size
1.1MB
-
Sample
221123-f6kc1scc97
-
MD5
2251b26b3bde548b3b1196d875d85127
-
SHA1
37b29696d5382d65c652ad10bf2b0867a59943c3
-
SHA256
e2d06e9e6fb4bff6de858e6589e3b8f068e4064372a09093f28165f3da48e0a7
-
SHA512
43a213b77683b64d767f984e91c2a8c6a37cd15d4a5edb854e8b053c11ba5eb7be42730e4dec182230c065051316fb7741ce3c9d5cfa3c195c1f01e35675549b
-
SSDEEP
24576:cyGuqdOFWyxSR1SckDKYlvwCZtrAX9TbS4Fs:suqdOFls1Pk2Ore9Tbp
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.27978.18935.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.27978.18935.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl/ - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
SecuriteInfo.com.Win32.PWSX-gen.27978.18935.exe
-
Size
1.1MB
-
MD5
2251b26b3bde548b3b1196d875d85127
-
SHA1
37b29696d5382d65c652ad10bf2b0867a59943c3
-
SHA256
e2d06e9e6fb4bff6de858e6589e3b8f068e4064372a09093f28165f3da48e0a7
-
SHA512
43a213b77683b64d767f984e91c2a8c6a37cd15d4a5edb854e8b053c11ba5eb7be42730e4dec182230c065051316fb7741ce3c9d5cfa3c195c1f01e35675549b
-
SSDEEP
24576:cyGuqdOFWyxSR1SckDKYlvwCZtrAX9TbS4Fs:suqdOFls1Pk2Ore9Tbp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-