General
-
Target
dc077770c6eac3a589aff5e72a4abf1d002bf28b9248c7fcc150ab95c90579a8
-
Size
671KB
-
Sample
221219-bxb8tsha5t
-
MD5
52453ef17161068401c7e4ecf5dc2f07
-
SHA1
e43d40ace468dd2f2290a85daab24db3971b7235
-
SHA256
dc077770c6eac3a589aff5e72a4abf1d002bf28b9248c7fcc150ab95c90579a8
-
SHA512
e3e4e83c6490b8dfefdb4e1765f338d4f06b36afd7ee004b480c0fc9c0c5d6ef22bedc3bdaaf20b56520833461cdb3a4bebd54a44dc16c7bd4a421c1313ec546
-
SSDEEP
12288:O6wOSV2xtAqQXR3VTnEah4TFwQcXn7dDhf6LzchvRndpxysTf5RZVX:3i2nAq2R3NEah4T07dNf6fWvRdvysTxt
Static task
static1
Behavioral task
behavioral1
Sample
dc077770c6eac3a589aff5e72a4abf1d002bf28b9248c7fcc150ab95c90579a8.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl/ - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
dc077770c6eac3a589aff5e72a4abf1d002bf28b9248c7fcc150ab95c90579a8
-
Size
671KB
-
MD5
52453ef17161068401c7e4ecf5dc2f07
-
SHA1
e43d40ace468dd2f2290a85daab24db3971b7235
-
SHA256
dc077770c6eac3a589aff5e72a4abf1d002bf28b9248c7fcc150ab95c90579a8
-
SHA512
e3e4e83c6490b8dfefdb4e1765f338d4f06b36afd7ee004b480c0fc9c0c5d6ef22bedc3bdaaf20b56520833461cdb3a4bebd54a44dc16c7bd4a421c1313ec546
-
SSDEEP
12288:O6wOSV2xtAqQXR3VTnEah4TFwQcXn7dDhf6LzchvRndpxysTf5RZVX:3i2nAq2R3NEah4T07dNf6fWvRdvysTxt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-