General
-
Target
0d82ed43d37d9117aecf438f7272c0ae813a9e2409dfa9208f6bec32c4c04c90
-
Size
1012KB
-
Sample
241219-bh1b4s1lek
-
MD5
6f640d1ceab80ee248a446051cc5765b
-
SHA1
352ef2b0232e8530143e010ad155883eff2608ab
-
SHA256
0d82ed43d37d9117aecf438f7272c0ae813a9e2409dfa9208f6bec32c4c04c90
-
SHA512
5d515b12610fe24f7bc7631308bf4c6e51139d08887e9edce87766e69f6092f629c4c98c41fbb607eefa7c16eb2553c871b9892339bb3f9b11b57678bb11f5b0
-
SSDEEP
24576:Wu6J33O0c+JY5UZ+XC0kGsoTCcYvN3naydWY:4u0c++OCvkGsECcYFngY
Static task
static1
Behavioral task
behavioral1
Sample
0d82ed43d37d9117aecf438f7272c0ae813a9e2409dfa9208f6bec32c4c04c90.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
0d82ed43d37d9117aecf438f7272c0ae813a9e2409dfa9208f6bec32c4c04c90
-
Size
1012KB
-
MD5
6f640d1ceab80ee248a446051cc5765b
-
SHA1
352ef2b0232e8530143e010ad155883eff2608ab
-
SHA256
0d82ed43d37d9117aecf438f7272c0ae813a9e2409dfa9208f6bec32c4c04c90
-
SHA512
5d515b12610fe24f7bc7631308bf4c6e51139d08887e9edce87766e69f6092f629c4c98c41fbb607eefa7c16eb2553c871b9892339bb3f9b11b57678bb11f5b0
-
SSDEEP
24576:Wu6J33O0c+JY5UZ+XC0kGsoTCcYvN3naydWY:4u0c++OCvkGsECcYFngY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-