General
-
Target
fa5a1df207a648eca9592adcf724bbc5e29667fca6d7f9e6ed64f0208fb43317
-
Size
1.1MB
-
Sample
221210-fjdxqahg2x
-
MD5
9185fb9e468c37c932d873c2209e4599
-
SHA1
522223be4d4d6f0773c5419e439097bb172985ca
-
SHA256
fa5a1df207a648eca9592adcf724bbc5e29667fca6d7f9e6ed64f0208fb43317
-
SHA512
eba1242d11eb04666d5e594611c317be55dcbd30f3240cedac2b89955532b646e13397eb5f78b9c06262edb9f6dfb9fd9bef29a80a60baeaa6ecb1ec3fa31d5e
-
SSDEEP
24576:skzgnwseRvrriCSJIcHfeHYaXNyvNLRnUfu66pFef:skcpGrLSJIwfVaMN9nUfd
Static task
static1
Behavioral task
behavioral1
Sample
fa5a1df207a648eca9592adcf724bbc5e29667fca6d7f9e6ed64f0208fb43317.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl/ - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
fa5a1df207a648eca9592adcf724bbc5e29667fca6d7f9e6ed64f0208fb43317
-
Size
1.1MB
-
MD5
9185fb9e468c37c932d873c2209e4599
-
SHA1
522223be4d4d6f0773c5419e439097bb172985ca
-
SHA256
fa5a1df207a648eca9592adcf724bbc5e29667fca6d7f9e6ed64f0208fb43317
-
SHA512
eba1242d11eb04666d5e594611c317be55dcbd30f3240cedac2b89955532b646e13397eb5f78b9c06262edb9f6dfb9fd9bef29a80a60baeaa6ecb1ec3fa31d5e
-
SSDEEP
24576:skzgnwseRvrriCSJIcHfeHYaXNyvNLRnUfu66pFef:skcpGrLSJIwfVaMN9nUfd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-