General
-
Target
4fd3fcb1b88f7709f233bccd02d98ce0N.exe
-
Size
1.0MB
-
Sample
240831-j5q1ystgkd
-
MD5
4fd3fcb1b88f7709f233bccd02d98ce0
-
SHA1
4f3381b79ca956136527724ed359fd55aae982a8
-
SHA256
54d8a9c0a8a4e49101f0215a386a8bdeb1095bd3abacf89487c9e41d115fe27c
-
SHA512
0d0dc25fc69ef96307fdbe49705bfc318427df515162de9a0e42393a2642b15d66200582e0dde07b441a7beecd1e07576df0c5ffe76cdf025cec7b0e22956e2e
-
SSDEEP
24576:5AHnh+eWsN3skA4RV1Hom2KXcmtcWBTaE9WHWivD5:Ah+ZkldoPKsacWFcN
Static task
static1
Behavioral task
behavioral1
Sample
4fd3fcb1b88f7709f233bccd02d98ce0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4fd3fcb1b88f7709f233bccd02d98ce0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.solucionesmexico.mx - Port:
21 - Username:
[email protected] - Password:
dGG^ZYIxX5!B
Targets
-
-
Target
4fd3fcb1b88f7709f233bccd02d98ce0N.exe
-
Size
1.0MB
-
MD5
4fd3fcb1b88f7709f233bccd02d98ce0
-
SHA1
4f3381b79ca956136527724ed359fd55aae982a8
-
SHA256
54d8a9c0a8a4e49101f0215a386a8bdeb1095bd3abacf89487c9e41d115fe27c
-
SHA512
0d0dc25fc69ef96307fdbe49705bfc318427df515162de9a0e42393a2642b15d66200582e0dde07b441a7beecd1e07576df0c5ffe76cdf025cec7b0e22956e2e
-
SSDEEP
24576:5AHnh+eWsN3skA4RV1Hom2KXcmtcWBTaE9WHWivD5:Ah+ZkldoPKsacWFcN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-