General
-
Target
b05562606e5a2feb8c55bcb365bd44eceb3660e2e234c48a10131cc333c6b07e
-
Size
533KB
-
Sample
241121-btbg5askbl
-
MD5
e8e409ae2894593f48c42de7519d5097
-
SHA1
96adc644e287a4214af143cf9c55051e513af972
-
SHA256
b05562606e5a2feb8c55bcb365bd44eceb3660e2e234c48a10131cc333c6b07e
-
SHA512
b961cce0c3c5186ba4ec7f8d2bf402116f0bb4b9a04c8611c4b43142bbdd7a824ae3c1fbd4b7d8b232ae0c0e357e84c624b9403a9bce4819de9ccaa74fd96c1c
-
SSDEEP
12288:Zua4SqQxjsGRHqJCnfVjtHSxc0MP9ayKHdm7A6Qxp4YTeoG:ZuBFQxsgHCgfmxcDP7U0IaAeZ
Behavioral task
behavioral1
Sample
pago devuelto_986754346346789076543486756457890.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
=A+N^@~c]~#I
Targets
-
-
Target
pago devuelto_986754346346789076543486756457890.exe
-
Size
558KB
-
MD5
6e140711ff9ec49f3fa96dbe3d8647f4
-
SHA1
2e0f7ae1f78b55f78c069c8081685a7b31671ea2
-
SHA256
ba2172b7494a5d9f39f2961396d9f6e7a1153a6ac358548eaa01831349a028b3
-
SHA512
f49520ec708bef0bae9f173428aedfbedebdbc5c5b2fee1725096296b25041858db35cc08d8493bac79cec045c35433d73ffb9d9fef7756e22e13065d25a1f7a
-
SSDEEP
12288:zquErHF6xC9D6DmR1J98w4oknqOOCyQfItlN6rSDFXvzKQeL0F:Krl6kD68JmlotQfWl2A1LZeL8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-