General
-
Target
e324b443ec618a2d918e9be6a2a5868f0bff85f8e90bec619146f249585a1644
-
Size
314KB
-
Sample
221222-c5w4msgh9y
-
MD5
f9e7203dfc0e2a439042e7bad0c6f332
-
SHA1
3b49eb85fdaff3b409779d24ff72c460a3a8f8f9
-
SHA256
e324b443ec618a2d918e9be6a2a5868f0bff85f8e90bec619146f249585a1644
-
SHA512
1f73ff39c1d6ea81f256c34cb6045f89daaa9ea058306913843fee7cb2d577da8e0504f3dd27fe3cf4e4d68e78095e85bc45837b6442fd0482d51c9191aad515
-
SSDEEP
6144:rkwmeVzslFNRUiAnqb1KNt5IjaiKjAmsPHtyYHgl5dZBhrmFQC3Jr:WlFNR/AqMNLb1cbtwHdD5CJZr
Static task
static1
Behavioral task
behavioral1
Sample
e324b443ec618a2d918e9be6a2a5868f0bff85f8e90bec619146f249585a1644.exe
Resource
win10-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl/ - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
e324b443ec618a2d918e9be6a2a5868f0bff85f8e90bec619146f249585a1644
-
Size
314KB
-
MD5
f9e7203dfc0e2a439042e7bad0c6f332
-
SHA1
3b49eb85fdaff3b409779d24ff72c460a3a8f8f9
-
SHA256
e324b443ec618a2d918e9be6a2a5868f0bff85f8e90bec619146f249585a1644
-
SHA512
1f73ff39c1d6ea81f256c34cb6045f89daaa9ea058306913843fee7cb2d577da8e0504f3dd27fe3cf4e4d68e78095e85bc45837b6442fd0482d51c9191aad515
-
SSDEEP
6144:rkwmeVzslFNRUiAnqb1KNt5IjaiKjAmsPHtyYHgl5dZBhrmFQC3Jr:WlFNR/AqMNLb1cbtwHdD5CJZr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-