General
-
Target
872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463
-
Size
814KB
-
Sample
241017-bsmh1axhml
-
MD5
c6ad6edfa92898ce230177f0ecb4890c
-
SHA1
49b4e85cbf95afab5be60b3272370886418d64e9
-
SHA256
872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463
-
SHA512
3865985334c5ac7a62f8cace759d2dcd13f8217472d9f3205eceaa0a418d1663f0f60826341ad569e4eeff22da86b1af80b49df8d4598e6e7b816c06113d8a6a
-
SSDEEP
12288:etc3yuZG8+De1kIse8LRWjrZCollIoNE8kOZu3OvK541rViCm:etc3yuZGVteKRyjl6ik4COvy41rV
Static task
static1
Behavioral task
behavioral1
Sample
872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.aminhacorretora.com.br - Port:
21 - Username:
[email protected] - Password:
_yA=,M5*J?KH
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.aminhacorretora.com.br - Port:
21 - Username:
[email protected] - Password:
_yA=,M5*J?KH
Targets
-
-
Target
872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463
-
Size
814KB
-
MD5
c6ad6edfa92898ce230177f0ecb4890c
-
SHA1
49b4e85cbf95afab5be60b3272370886418d64e9
-
SHA256
872f1970c19bbf2031fe43f9ed034f1edd2763e6ecda2de368336da3312d8463
-
SHA512
3865985334c5ac7a62f8cace759d2dcd13f8217472d9f3205eceaa0a418d1663f0f60826341ad569e4eeff22da86b1af80b49df8d4598e6e7b816c06113d8a6a
-
SSDEEP
12288:etc3yuZG8+De1kIse8LRWjrZCollIoNE8kOZu3OvK541rViCm:etc3yuZGVteKRyjl6ik4COvy41rV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-