General
-
Target
cf0e9b600ad0423f919ca88086246c29c548444f6d0d193bb238b7fbc513d2fb.rar
-
Size
559KB
-
Sample
240905-hr2d4awdnf
-
MD5
970e94c58009238333ab475eb029e947
-
SHA1
81bbdd97d248d2c7c60a7da05b37a1406d82b784
-
SHA256
cf0e9b600ad0423f919ca88086246c29c548444f6d0d193bb238b7fbc513d2fb
-
SHA512
b07f65c3d1f93cbe7ba26874a2837477936ee73f6086f9565703d7641d8d52c91de5efcb4f04e7331dea151c50c6e260e2d98ef845f764d20e662afdf1321e51
-
SSDEEP
12288:zd3HHZpCkQR+9Nka0IEsAoOxwBoj0QDsq8TjABUY8TC5bDtgsXfBL:h3HXQZa0IEjbWoAQDs5TckC5lP9
Behavioral task
behavioral1
Sample
aplicação de cotação.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aplicação de cotação.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ultraflex.com.mx - Port:
21 - Username:
[email protected] - Password:
Jgj8-p4Z]a1b
Targets
-
-
Target
aplicação de cotação.exe
-
Size
584KB
-
MD5
0c39690ccaf6423656511f70f786f69b
-
SHA1
a18ca5f0aceadb3d439d503dd4e7a3da5ae27e4f
-
SHA256
7b0781645e52ad2c61df1c8b67d9d5748666f5d2f2664432bb506b4da0436637
-
SHA512
e582516605f628ec4ef1be65470249a27428f4ed2c8e687c896610f12dacb02fc1ff395f14af7cb45480a4ff16ed5ed532cd65065ceac3c6b048829f1d5b20f9
-
SSDEEP
12288:8YV6MorX7qzuC3QHO9FQVHPF51jgctJhSCx4ye5nEhrXqQwngIDHPI:bBXu9HGaVH8Cle5EhWQmgoPI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-