General
-
Target
838bcd6a993a9fa7601030fb2d85e5789afca334365d6f359be9733e6e6559c0
-
Size
585KB
-
Sample
241214-bgjmzatqbp
-
MD5
e7d3397afa577102c61d81bf688c2db4
-
SHA1
043ca1a521f53e81da0c2bb4a39bb0b864029588
-
SHA256
838bcd6a993a9fa7601030fb2d85e5789afca334365d6f359be9733e6e6559c0
-
SHA512
8a72bc25dc876e2d87b176e909cd16ddfb4da4e9b39177f9b0d85473d82ee89edd77a0ec10f85fda6edc3e707b0cc84afc1776b1cf02ff26fb480891fa37eca4
-
SSDEEP
12288:P6JvVxvUb1cMLAMicQNNSp1dAHPqCMH6LNT/fE/ZRYIfTdtm67:yNxWNicQNNStAHPqC3/c/8Qe67
Static task
static1
Behavioral task
behavioral1
Sample
Ordine n°24-00980.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.transotraval.cl - Port:
21 - Username:
[email protected] - Password:
vIZ2P]dt&a!d
Targets
-
-
Target
Ordine n°24-00980.exe
-
Size
588KB
-
MD5
109d45c3b8f2be7efd8a1c72b58a7219
-
SHA1
1ac06fdb16045dd3f2654b9e610fcf8abf53cff1
-
SHA256
bc8c295e4538bde3e11a4a7604107998fc0b473cc7685462886fc97fbcd9d454
-
SHA512
4a71e436ef8a4e19f7db733003b001026ca4333a6d558cad41ddac25d29bb452e5dc6f6526f330f8b0665b9d1c95cdef2258fd50a89f0167e6a9f61569081861
-
SSDEEP
12288:JbcDSPWvpV5m057P2mqPCt15Zncw03El3183jbU2P:e2PWvpVk+2wdle3/U2P
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-