General
-
Target
458607d64c6d19bf71d7e88cd3fe61ba9c127eb5b20487b96679d7d13458c1df
-
Size
526KB
-
Sample
241218-bgrzcawjgz
-
MD5
9e1e3c2f95793fa4ba283340e553da43
-
SHA1
91bd166e29c9e802ab5481953ce2fbc8eab10b64
-
SHA256
458607d64c6d19bf71d7e88cd3fe61ba9c127eb5b20487b96679d7d13458c1df
-
SHA512
aaa0c8154b16587f21eace80c8c509c3aaa3726dcd904656828d63f58813a5edbdcbc3459fc998cb230c0a621416cb63ffddb7b4ace84cb3f7c7b8fd72407950
-
SSDEEP
12288:oAYstGlEkf+gxWl/1KE/Z3haHJWHTMdbwrk2UOnvNBQyF1ojdo:o2tG+kfXxWl/sYZTHLo2HNSyao
Behavioral task
behavioral1
Sample
facturas vencidas, 3445650098, 0099, 00976, 009668, 009678, 0056598433.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
facturas vencidas, 3445650098, 0099, 00976, 009668, 009678, 0056598433.exe
-
Size
551KB
-
MD5
1fd2a122f365f699c69d0766b8ceab1e
-
SHA1
5c52d1db9d4b5881f5abf337b63720acddcaaff4
-
SHA256
6aa9264537be17d166a1a5216f8efffb0c674f8ca6cdc15996c12da7c6ca33bd
-
SHA512
0754447c235d16becb5cfe115d637176f9aa7d79ae65862dda9cbeeaf90095833a4348de2061733126448b812ba85851d4066ef918525815f728a5ccf5c5fe5b
-
SSDEEP
12288:/quErHF6xC9D6DmR1J98w4oknqOOCyQfnVP3gH4ssNlmqO2lyMgIVFY57:Grl6kD68JmlotQfVvY4dFO2y
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-