General
-
Target
20092024_0140_17092024_comprobante_swift0000099.uu
-
Size
812KB
-
Sample
240920-b3j6masgqn
-
MD5
20abeae52a48206210e167065304b09b
-
SHA1
7eac10701418a0d95483487293f8efba309b17bb
-
SHA256
684729b66bdeca51b3e40486a241ad0f2c6312fddf84b0b04a1300a8171cf658
-
SHA512
02ad96db39b70ab4708b793f17b9750db9877886fb82a585dc013ac61aab7cd590522d3f872a2ee2600a92d7ac8d18006f2120efdac141d1182ef750ae474a77
-
SSDEEP
12288:gTr/vdlbDnT0cudvkUeJ6N6XK324SWjWLnAexmoTEHWEiFCHVqdkXoP2ZxoVcMYo:Er/llbDMdvhq6G427TgWP8YkXQncDo
Behavioral task
behavioral1
Sample
comprobante_swift0000099.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
comprobante_swift0000099.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
comprobante_swift0000099.exe
-
Size
826KB
-
MD5
4e94db0febef97c25d47b2efa4f8e5f3
-
SHA1
8ee81611a5fa3ba4f7c572556c4d25be98edc934
-
SHA256
20248a7006d2050da17a84baba48dc66149667ca24c79efbf71ceef6e10a27f5
-
SHA512
bafd1a65bfdb0d6425a00a0656f611ab3a152ec710604ce7ca63708bfd2bdc78ce105088e07d7361c9a657b422f3a78d6450b379a0e6425823b3e60e14eb922e
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLekmmpS2/V12BWr1BtqpZbXPf+bj7uD9/t3RMfaMCy:tthEVaPqLampSQLAZrPuujMH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-