General
-
Target
a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4.exe
-
Size
1.1MB
-
Sample
240905-b2vwqszhrq
-
MD5
eb5ba52c5fbc1efa1d7e3c7d9364654e
-
SHA1
fa088e270c9df961788001611785051280fbd09c
-
SHA256
a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4
-
SHA512
2facede2a967280d728111190ce0d4c3ea6cc20cb0e4079368976c98bb673807242c52a44261fd3164a35f5f19acf16c2e98fdceb18112b07f986243d435dbe4
-
SSDEEP
24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8autKPcz5nMzzZ:YTvC/MTQYxsWR7autz
Static task
static1
Behavioral task
behavioral1
Sample
a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.solucionesmexico.mx - Port:
21 - Username:
[email protected] - Password:
dGG^ZYIxX5!B
Targets
-
-
Target
a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4.exe
-
Size
1.1MB
-
MD5
eb5ba52c5fbc1efa1d7e3c7d9364654e
-
SHA1
fa088e270c9df961788001611785051280fbd09c
-
SHA256
a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4
-
SHA512
2facede2a967280d728111190ce0d4c3ea6cc20cb0e4079368976c98bb673807242c52a44261fd3164a35f5f19acf16c2e98fdceb18112b07f986243d435dbe4
-
SSDEEP
24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8autKPcz5nMzzZ:YTvC/MTQYxsWR7autz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-