General
-
Target
1ded2fbe9d5eee0b43c61d7120101b3df170850b3723852598aadb1e20176e1b
-
Size
590KB
-
Sample
241227-bgen1sxmhq
-
MD5
7be783d9c8b0a26e5fdae8fd0f0afd5f
-
SHA1
75d0456976cf0a79bbf46f90a203ccd006fada32
-
SHA256
1ded2fbe9d5eee0b43c61d7120101b3df170850b3723852598aadb1e20176e1b
-
SHA512
d0653cbb52aebf59789757076b5cb1851f348887476f96ae244eb6a1b86ab60d50141abc56d0d04282e7bfddf323cf85576434267d644d01bf66845c0c9f765d
-
SSDEEP
12288:83FYMTnczlI1lHyJNnflJzJEBwWj49LTXKal36qvD7B:83FWzlI1lynflJz+uWj8Xt6qvvB
Static task
static1
Behavioral task
behavioral1
Sample
(BBVA)_consulta_de_operaciones SWIFT 19-12-2024.exe
Resource
win7-20241023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
srv.masternic.net - Port:
587 - Username:
[email protected] - Password:
-H{2Szxi!%qb - Email To:
[email protected]
Targets
-
-
Target
(BBVA)_consulta_de_operaciones SWIFT 19-12-2024.exe
-
Size
1.1MB
-
MD5
2f3cdcec9cd413b4275b90eaf8b3beb7
-
SHA1
b2255b49cff673dbe6ba36a33894f2b4dda8bc24
-
SHA256
e8d6b276a7c25113dbe45e4f2a35ea7e9095b4a7ba189af29481d5cfcdf0fd2a
-
SHA512
dfc674c023e3fce9fbced360187c73683e54ca2aa6b9d41cfd9cfe30b9c44905dfa95b5ecedbc1a39abe241a894753622cb352396a3a1362a4d7b924f6112c37
-
SSDEEP
24576:NqDEvCTbMWu7rQYlBQcBiT6rprG8a1fjDXuX1v:NTvC/MTQYxsWR7a1f3XuX1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-