General
-
Target
43c8170c193a7c8dac1fef61e24f31d8bd954ee7645458e092b5a0dfda03bb41
-
Size
528KB
-
Sample
241217-bedzpswpaj
-
MD5
658eeb4ddb2fe998c1425aa146047730
-
SHA1
ae7f4830c80460db3a821870b466128026ecfcf0
-
SHA256
43c8170c193a7c8dac1fef61e24f31d8bd954ee7645458e092b5a0dfda03bb41
-
SHA512
9b06de14074db56277a3137f7e9a22ca6d7dcb5e5aa8e199f3a0f7277385ee6e68d155bb316dc29ca54d678eda03578578b91d39805cc3de12b83926b3aa9d9e
-
SSDEEP
12288:rBstGlEkf+gxWl/1KE/Z3haHJWHTMqUi3j5/LsVcXs4eABwPCY:qtG+kfXxWl/sYZTH0M/Lac84BACY
Behavioral task
behavioral1
Sample
Envío de Orden de Compra No. 66534_867542345467897867868967.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
Envío de Orden de Compra No. 66534_867542345467897867868967.exe
-
Size
552KB
-
MD5
7c2f6ad007de6e04e91b641e5b7354ce
-
SHA1
13c5437220f48c5ce507040e45ab7da543fb6b44
-
SHA256
1fb1198c951352f674ea1afa234096687a52fb562fc81e8ae7fbf531b41d44e4
-
SHA512
cf9bb7c0400d264615302189a85ddd27f6481ac3e9785242efb177e0af2d10bfef448a244fb832212432287c3f16353efabffe20f069545c40268198f1403caf
-
SSDEEP
12288:aquErHF6xC9D6DmR1J98w4oknqOOCyQfaW3pRcBXTGrH5ei:Prl6kD68JmlotQfxeXmN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-