General
-
Target
5ace7702d0fa480105ae05c8edd6344513b3f911d4257a6dec9c123d66a8e594
-
Size
525KB
-
Sample
221228-3qvkdafa6t
-
MD5
e2733a5dd19a546275fca8f958569312
-
SHA1
517fa0d68f0604508b3c65d36ab15114ccf9acc1
-
SHA256
5ace7702d0fa480105ae05c8edd6344513b3f911d4257a6dec9c123d66a8e594
-
SHA512
80ff304269a4df1118c889871240c1a4c9f2e5d7966644690ef1056d00662f040ea4352bcde3cdece65cf4e4a55e229c321567c705c96fd5ddaf2cfb70ceaafb
-
SSDEEP
12288:HY3shrtvJ4uNMIL/TzLN4kBII2CIXwW97SK4+CW/oVdoM:HYa1KAH3II2HXV7Sgk
Static task
static1
Behavioral task
behavioral1
Sample
5ace7702d0fa480105ae05c8edd6344513b3f911d4257a6dec9c123d66a8e594.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
5ace7702d0fa480105ae05c8edd6344513b3f911d4257a6dec9c123d66a8e594
-
Size
525KB
-
MD5
e2733a5dd19a546275fca8f958569312
-
SHA1
517fa0d68f0604508b3c65d36ab15114ccf9acc1
-
SHA256
5ace7702d0fa480105ae05c8edd6344513b3f911d4257a6dec9c123d66a8e594
-
SHA512
80ff304269a4df1118c889871240c1a4c9f2e5d7966644690ef1056d00662f040ea4352bcde3cdece65cf4e4a55e229c321567c705c96fd5ddaf2cfb70ceaafb
-
SSDEEP
12288:HY3shrtvJ4uNMIL/TzLN4kBII2CIXwW97SK4+CW/oVdoM:HYa1KAH3II2HXV7Sgk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-