General
-
Target
ea9f7433c61ed483a0293ce78d8e37e9caa791c71a7527afe9a3f8093b151889
-
Size
879KB
-
Sample
241016-dzb2yszfqc
-
MD5
b57fbe0a314951226c6127464f761a0b
-
SHA1
63bda873e2b8a5c9361f31c992537fe9c55b2653
-
SHA256
ea9f7433c61ed483a0293ce78d8e37e9caa791c71a7527afe9a3f8093b151889
-
SHA512
98b227c62bf513794011c05010f80472c2c8cea4f4fd9b2477cb40d3c98bd8aa57c9cd44b7dc769c6691c275534cf36a610319da6e9c4b11681457b68d33a458
-
SSDEEP
24576:wPjfYKO13GnKAuxZP3HP4SUQEFY1BvZmTA1V25sO:w7fYKQW90P3HOFQsAWsO
Static task
static1
Behavioral task
behavioral1
Sample
LISTA DE COTIZACIONES.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LISTA DE COTIZACIONES.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
uy,o#mZj8$lY
Targets
-
-
Target
LISTA DE COTIZACIONES.exe
-
Size
1.2MB
-
MD5
9e0277fc96f86accaa6dbf0fe729c0dc
-
SHA1
8b3425a0441f56f37a20b81a9dd023fc83abb06f
-
SHA256
3de2d235de3dd1488d4405382c3498030d84ff10c0ce04597f2e8151bd92efff
-
SHA512
519b8f9634b1c1662d2fae60a1bcba670f2966317fa5d67469bc8dc4983fb8fae806a8acbd79e195c98b4ff8fda39bf1ff47adb8d873bcc6fd7a288751d8ee80
-
SSDEEP
24576:WfmMv6Ckr7Mny5Q6nwI0K/FbcxA24XJnqToZUMBYA1jDg:W3v+7/5Q6LjGA24ZOWDg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-