General
-
Target
02d38b4732a1f342ddea2096d1f258f730b7370701310a46caf895b75d8ea565
-
Size
559KB
-
Sample
241116-bkcc3awjcy
-
MD5
b388100842ade5d8957606ed7cf22a84
-
SHA1
31ca9031dd7b5185d22f50d414918f3a34ab5fe3
-
SHA256
02d38b4732a1f342ddea2096d1f258f730b7370701310a46caf895b75d8ea565
-
SHA512
0c55d404c02cb42a17527fc714edac28cc6395858c274e6f6aecd7b41974409f6069aea9c94d42f3cf807f966c418f2e8b5a45a3bed0d81381dfdb8913d2833e
-
SSDEEP
12288:zwXIZjbQgpyzrSeh605Tmg0WDnYgYck6YtuRKj:zwC1yHSjgYj6YtcKj
Static task
static1
Behavioral task
behavioral1
Sample
transferencia_swift_896756434234675869786756453457689.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
4r@d15PS!-!h
Targets
-
-
Target
transferencia_swift_896756434234675869786756453457689.exe
-
Size
1.0MB
-
MD5
e782151f11c6e57432757c6f4e8aa9d1
-
SHA1
c1bd66f4bbae2141909f6f600a6a4dbf5d80139c
-
SHA256
f1a7e0b955abe2ea81422407e5946e6f55a0db05f5b93d84767ae9d1b760a3fa
-
SHA512
ac3b183172da6a596a352f6e5a55743535b0ad18f3a4499ca24604c37cb08e64fd18ab90ebfbf7dfad102a83c0bb5251154e93da1637807ba985e81a7744a9ef
-
SSDEEP
24576:ptb20pkaCqT5TBWgNQ7a02jYd/DOoLk6A:6Vg5tQ7a0HLfY5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-