General
-
Target
c08b09f69650196df583b80543abe92c.exe
-
Size
968KB
-
Sample
230301-xrhz3shg46
-
MD5
c08b09f69650196df583b80543abe92c
-
SHA1
ca315e85ca34197ad930f2ce39bbe6cf104e3f50
-
SHA256
34ee1f687542eedbad8004e9f6861d4842497c08d5374bf6ea50a8af633ebc22
-
SHA512
2f10568cf0ae18d0158da3c27a6c1bf2d7241162c694139d48c83bbba966c509979940df8f8d528da9db4b812462dd615e610d91fd4a536920877f2a347239f0
-
SSDEEP
12288:A47JFnXAvK4UbqJpJwZ87+kcf2GH5bgOe1tvwby3czuJNNYplW4Bz1KGRbItlJ:ACiUEm877gV50bw+4iYHh8
Static task
static1
Behavioral task
behavioral1
Sample
c08b09f69650196df583b80543abe92c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c08b09f69650196df583b80543abe92c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
c08b09f69650196df583b80543abe92c.exe
-
Size
968KB
-
MD5
c08b09f69650196df583b80543abe92c
-
SHA1
ca315e85ca34197ad930f2ce39bbe6cf104e3f50
-
SHA256
34ee1f687542eedbad8004e9f6861d4842497c08d5374bf6ea50a8af633ebc22
-
SHA512
2f10568cf0ae18d0158da3c27a6c1bf2d7241162c694139d48c83bbba966c509979940df8f8d528da9db4b812462dd615e610d91fd4a536920877f2a347239f0
-
SSDEEP
12288:A47JFnXAvK4UbqJpJwZ87+kcf2GH5bgOe1tvwby3czuJNNYplW4Bz1KGRbItlJ:ACiUEm877gV50bw+4iYHh8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-