General
-
Target
c6ce9ff77da08fa01b83d2a188bb925eac04133ed6264b5ad90b7b0de8cddca5
-
Size
633KB
-
Sample
241121-bw62taybmr
-
MD5
793a83b27d09ccf51a1679a5f4ab3d80
-
SHA1
3f9b5517c025e154d92f28f6b1c283a7e0cb0ab1
-
SHA256
c6ce9ff77da08fa01b83d2a188bb925eac04133ed6264b5ad90b7b0de8cddca5
-
SHA512
e17ccb50bc0a258f7530f34b5c9a517b9399150ea81b5b6edfa02d583928491b566ba124b1e61e90526de6eff67c82df0f71e58dbf1dfaf9323b1143fb40a6d6
-
SSDEEP
12288:hzAgFdJxf2WMiQPIt+HCQOcFNLWrEawmJ3bxfeA8FjM2LYmGLw2Cb8uD:9AgJxf2WMiQPakbaZ3bx+M2jGLTo
Static task
static1
Behavioral task
behavioral1
Sample
c6ce9ff77da08fa01b83d2a188bb925eac04133ed6264b5ad90b7b0de8cddca5.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.solucionesmexico.mx - Port:
21 - Username:
[email protected] - Password:
dGG^ZYIxX5!B
Extracted
Protocol: ftp- Host:
ftp.solucionesmexico.mx - Port:
21 - Username:
[email protected] - Password:
dGG^ZYIxX5!B
Targets
-
-
Target
c6ce9ff77da08fa01b83d2a188bb925eac04133ed6264b5ad90b7b0de8cddca5
-
Size
633KB
-
MD5
793a83b27d09ccf51a1679a5f4ab3d80
-
SHA1
3f9b5517c025e154d92f28f6b1c283a7e0cb0ab1
-
SHA256
c6ce9ff77da08fa01b83d2a188bb925eac04133ed6264b5ad90b7b0de8cddca5
-
SHA512
e17ccb50bc0a258f7530f34b5c9a517b9399150ea81b5b6edfa02d583928491b566ba124b1e61e90526de6eff67c82df0f71e58dbf1dfaf9323b1143fb40a6d6
-
SSDEEP
12288:hzAgFdJxf2WMiQPIt+HCQOcFNLWrEawmJ3bxfeA8FjM2LYmGLw2Cb8uD:9AgJxf2WMiQPakbaZ3bx+M2jGLTo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-