General
-
Target
c534d029f5b4a04348e4d3fe940293b062b7f841f37bd088aeba2b24d65cd458.rar
-
Size
501KB
-
Sample
241129-ek9kcatqfx
-
MD5
2b1e26764f81dd1851684baf2ce14d7e
-
SHA1
182e835bbeed359bb07dd7cf9b29b3c73c6b9866
-
SHA256
c534d029f5b4a04348e4d3fe940293b062b7f841f37bd088aeba2b24d65cd458
-
SHA512
913caf80155351c650cc6b1f9b293b5fe54ad32a05b7f6687223792bba32c4fcadb8803c12345fc65d84eb16de2d598aaaf49ba2b621956e849357116f8ab643
-
SSDEEP
12288:GJzeAbDykvq+4W8yPc/ZOPlfUCQgJ2kKX2xK:C5N4W+/ZgjRJ2kKX2xK
Static task
static1
Behavioral task
behavioral1
Sample
Orden de compra.pdf______________________________________.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.horeca-bucuresti.ro - Port:
21 - Username:
[email protected] - Password:
H*TE9iL;x61m
Targets
-
-
Target
Orden de compra.pdf______________________________________.exe
-
Size
997KB
-
MD5
a3d37ee0e82f58368c4c3bef2dde45a3
-
SHA1
d49fd6fead6dd95008df3dc1fe667159de863a35
-
SHA256
83f55d18f4fac1c019ee22eaf1d84a247f0631c271d7d52c49025488346438c3
-
SHA512
9b14b8012ba942dbbddcaae2685ae75252276046bbe58028028aacb8a5cb53c528cf8e66cb3633f5c020db63b53a37f8cfbab3089b1d0582c7e9e3da9d5177bd
-
SSDEEP
24576:6tb20pkaCqT5TBWgNQ7a9E3LDdpCQyIaI46A:nVg5tQ7a9E3fPNpO5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-