General
-
Target
84b8c47f4fa7e736e66ac6401a0f01d60522cc644e225318acb787a25034586f
-
Size
1012KB
-
Sample
241120-bm5gmaxblc
-
MD5
758ea76e22dd3e20eaffbdfab8df137d
-
SHA1
392c5fe22196ff6ace463f0f40d02bc77753b4ac
-
SHA256
84b8c47f4fa7e736e66ac6401a0f01d60522cc644e225318acb787a25034586f
-
SHA512
abb042716e677eccd5eedcedd6b530eb15ffd0b08082540485ad4021dc818a71242e9a3e0bcbc974cabe1f09176c45fa8df0bcf96936f2895240e3b5e47c8855
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGso6FaEXVk382vWY:Eu0c++OCvkGs9FaElkCY
Static task
static1
Behavioral task
behavioral1
Sample
84b8c47f4fa7e736e66ac6401a0f01d60522cc644e225318acb787a25034586f.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
4r@d15PS!-!h
Targets
-
-
Target
84b8c47f4fa7e736e66ac6401a0f01d60522cc644e225318acb787a25034586f
-
Size
1012KB
-
MD5
758ea76e22dd3e20eaffbdfab8df137d
-
SHA1
392c5fe22196ff6ace463f0f40d02bc77753b4ac
-
SHA256
84b8c47f4fa7e736e66ac6401a0f01d60522cc644e225318acb787a25034586f
-
SHA512
abb042716e677eccd5eedcedd6b530eb15ffd0b08082540485ad4021dc818a71242e9a3e0bcbc974cabe1f09176c45fa8df0bcf96936f2895240e3b5e47c8855
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGso6FaEXVk382vWY:Eu0c++OCvkGs9FaElkCY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-