General
-
Target
Factura 422934 pago bbva swift.exe
-
Size
1.0MB
-
Sample
240628-jqdr3sycph
-
MD5
ed9f49416a518a5e9d16ce233245ccc0
-
SHA1
6db3b33a370a7bf3398d2032d913cae701ab4b5f
-
SHA256
adcaadb9fbc4c4abb883745995a4982fdc1e6b7737b10abe271d3f1d47384dac
-
SHA512
aeb49191432fddca5966a8837ceb711a2eed11609b92cee098215d01acf07296dfe5aba71ce5540eefe00952d1b324ac59518ab3b3eaea8e542165259a34341e
-
SSDEEP
24576:IAHnh+eWsN3skA4RV1Hom2KXMmHahKFXF8XIapQ5+5:Ph+ZkldoPK8YahKFXF84QH
Static task
static1
Behavioral task
behavioral1
Sample
Factura 422934 pago bbva swift.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Factura 422934 pago bbva swift.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.gizemetiket.com.tr - Port:
21 - Username:
pgizemM6 - Password:
giz95Ffg
Targets
-
-
Target
Factura 422934 pago bbva swift.exe
-
Size
1.0MB
-
MD5
ed9f49416a518a5e9d16ce233245ccc0
-
SHA1
6db3b33a370a7bf3398d2032d913cae701ab4b5f
-
SHA256
adcaadb9fbc4c4abb883745995a4982fdc1e6b7737b10abe271d3f1d47384dac
-
SHA512
aeb49191432fddca5966a8837ceb711a2eed11609b92cee098215d01acf07296dfe5aba71ce5540eefe00952d1b324ac59518ab3b3eaea8e542165259a34341e
-
SSDEEP
24576:IAHnh+eWsN3skA4RV1Hom2KXMmHahKFXF8XIapQ5+5:Ph+ZkldoPK8YahKFXF84QH
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-