General
-
Target
7f6c6ea6eba170a6d162182bbb4b16da9d6125716a0ceb31e7d4af4e666f8d3b.exe
-
Size
99.0MB
-
Sample
241011-n9rkha1dpg
-
MD5
3e92a9242c1347f9924b1d6631d27163
-
SHA1
d9d5b557835fb6b1f797e352f441930053f38e76
-
SHA256
7f6c6ea6eba170a6d162182bbb4b16da9d6125716a0ceb31e7d4af4e666f8d3b
-
SHA512
90a38196ae610fc2d546e0cd60d936762ea95f89cd1847adc18498ffd2dbbad3bf3cb7fcf39ca08963cb0fc89631ecf59db9cb8c6422f3d2b0caf87b672c260a
-
SSDEEP
24576:54GHnhIzOaW8Aweki81o2UiEAFmOtsXPxU0155cCW:OshdazA/k/7UiEAFmOG5Uq3
Behavioral task
behavioral1
Sample
7f6c6ea6eba170a6d162182bbb4b16da9d6125716a0ceb31e7d4af4e666f8d3b.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.controlfire.com.mx - Port:
21 - Username:
[email protected] - Password:
0a4XlE=4t8mz
Targets
-
-
Target
7f6c6ea6eba170a6d162182bbb4b16da9d6125716a0ceb31e7d4af4e666f8d3b.exe
-
Size
99.0MB
-
MD5
3e92a9242c1347f9924b1d6631d27163
-
SHA1
d9d5b557835fb6b1f797e352f441930053f38e76
-
SHA256
7f6c6ea6eba170a6d162182bbb4b16da9d6125716a0ceb31e7d4af4e666f8d3b
-
SHA512
90a38196ae610fc2d546e0cd60d936762ea95f89cd1847adc18498ffd2dbbad3bf3cb7fcf39ca08963cb0fc89631ecf59db9cb8c6422f3d2b0caf87b672c260a
-
SSDEEP
24576:54GHnhIzOaW8Aweki81o2UiEAFmOtsXPxU0155cCW:OshdazA/k/7UiEAFmOG5Uq3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-