General
-
Target
5846ba3907ffe7a37e92ec7154c723b79ffe6b5b555912c70088e8cddccc1e93.exe
-
Size
678KB
-
Sample
240910-b9v7gasgne
-
MD5
9316ff927453a87f0977c9490f748070
-
SHA1
a0ddfbe4639fc95ce936d489e1ce1ee886efafb8
-
SHA256
5846ba3907ffe7a37e92ec7154c723b79ffe6b5b555912c70088e8cddccc1e93
-
SHA512
283fd69d34f96be1f13820682f780198c081409662229bce1bf949c2eb8c9879d4d00d951f353f193e8f9851f8541b714a580c366726abb087400bf61fea84f8
-
SSDEEP
12288:qIkcxKnpHh+NyXjv0XislZzl4B0X1COYb2c/LwHT/gNH6j9V3RgQ0hNS905f/Vu5:qHJSDXf/XdcNumC
Static task
static1
Behavioral task
behavioral1
Sample
5846ba3907ffe7a37e92ec7154c723b79ffe6b5b555912c70088e8cddccc1e93.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5846ba3907ffe7a37e92ec7154c723b79ffe6b5b555912c70088e8cddccc1e93.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ultraflex.com.mx - Port:
21 - Username:
[email protected] - Password:
Jgj8-p4Z]a1b
Targets
-
-
Target
5846ba3907ffe7a37e92ec7154c723b79ffe6b5b555912c70088e8cddccc1e93.exe
-
Size
678KB
-
MD5
9316ff927453a87f0977c9490f748070
-
SHA1
a0ddfbe4639fc95ce936d489e1ce1ee886efafb8
-
SHA256
5846ba3907ffe7a37e92ec7154c723b79ffe6b5b555912c70088e8cddccc1e93
-
SHA512
283fd69d34f96be1f13820682f780198c081409662229bce1bf949c2eb8c9879d4d00d951f353f193e8f9851f8541b714a580c366726abb087400bf61fea84f8
-
SSDEEP
12288:qIkcxKnpHh+NyXjv0XislZzl4B0X1COYb2c/LwHT/gNH6j9V3RgQ0hNS905f/Vu5:qHJSDXf/XdcNumC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-