General
-
Target
SOLICITUD DE PAGO.gzh
-
Size
780KB
-
Sample
241014-qwxkpsscjj
-
MD5
b4db119be3f682831d1064231e10b012
-
SHA1
94bcf8bacc7713ddfadeeb1ddc087eeb3cb5bb0b
-
SHA256
7d9ff3fda3b7f5805638e2d71df6edf497be9c0d455e57c9be2ddf388ce05573
-
SHA512
399ac6a6407883f48ad7d311b037f72649648e6e7dc818397a7b146e46b81e946abb31bf1cb2bef46e9af51d0d5d6a4297e1c35e6e3390b9349ef973ca72569e
-
SSDEEP
24576:82rcKPRQQFvUpCqQ/NgsXZatn5f2vft9THf+5iTE0Aet:+KPRQQCegyat8n7rwiSet
Behavioral task
behavioral1
Sample
SOLICITUD DE PAGO.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ultraflex.com.mx - Port:
21 - Username:
[email protected] - Password:
Jgj8-p4Z]a1b
Targets
-
-
Target
SOLICITUD DE PAGO.exe
-
Size
804KB
-
MD5
eca6e5d1b6da0957d7a179605977c7f3
-
SHA1
f3d3cdc9b1ac8bdfd092e718c264cb291e73f99e
-
SHA256
b4337365f4919ca5330d2da47e51e60f343f0aef026410790a94e30f289cea0e
-
SHA512
9150f1f1dbc635317390bd9503928247c0ab75df66cb00a41061daae4e8ca40f00e2dc85c0cd6bb9bb65172077b57cc078e81ba2b2f177ad45e18a73bafc6c86
-
SSDEEP
24576:jq5TfcdHj4fmbvl2B16spQwmi4t154I+1xlS:jUTsambzcn4Lm1xl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-