General
-
Target
7b0781645e52ad2c61df1c8b67d9d5748666f5d2f2664432bb506b4da0436637.exe
-
Size
584KB
-
Sample
240905-bxbbjazgrk
-
MD5
0c39690ccaf6423656511f70f786f69b
-
SHA1
a18ca5f0aceadb3d439d503dd4e7a3da5ae27e4f
-
SHA256
7b0781645e52ad2c61df1c8b67d9d5748666f5d2f2664432bb506b4da0436637
-
SHA512
e582516605f628ec4ef1be65470249a27428f4ed2c8e687c896610f12dacb02fc1ff395f14af7cb45480a4ff16ed5ed532cd65065ceac3c6b048829f1d5b20f9
-
SSDEEP
12288:8YV6MorX7qzuC3QHO9FQVHPF51jgctJhSCx4ye5nEhrXqQwngIDHPI:bBXu9HGaVH8Cle5EhWQmgoPI
Behavioral task
behavioral1
Sample
7b0781645e52ad2c61df1c8b67d9d5748666f5d2f2664432bb506b4da0436637.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7b0781645e52ad2c61df1c8b67d9d5748666f5d2f2664432bb506b4da0436637.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ultraflex.com.mx - Port:
21 - Username:
[email protected] - Password:
Jgj8-p4Z]a1b
Targets
-
-
Target
7b0781645e52ad2c61df1c8b67d9d5748666f5d2f2664432bb506b4da0436637.exe
-
Size
584KB
-
MD5
0c39690ccaf6423656511f70f786f69b
-
SHA1
a18ca5f0aceadb3d439d503dd4e7a3da5ae27e4f
-
SHA256
7b0781645e52ad2c61df1c8b67d9d5748666f5d2f2664432bb506b4da0436637
-
SHA512
e582516605f628ec4ef1be65470249a27428f4ed2c8e687c896610f12dacb02fc1ff395f14af7cb45480a4ff16ed5ed532cd65065ceac3c6b048829f1d5b20f9
-
SSDEEP
12288:8YV6MorX7qzuC3QHO9FQVHPF51jgctJhSCx4ye5nEhrXqQwngIDHPI:bBXu9HGaVH8Cle5EhWQmgoPI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-