General
-
Target
89A630080AAAD5154B8900721033B9BB65CE27BEEB389D50EE50B216FB394871
-
Size
100.0MB
-
Sample
250103-jpmctsxpfn
-
MD5
b8a6ae8a737a421280af1f04ee30ac09
-
SHA1
3ca3e1e980eb13a788f6ca1ada931f2410951b6f
-
SHA256
89a630080aaad5154b8900721033b9bb65ce27beeb389d50ee50b216fb394871
-
SHA512
5798d3456272082508252fd264026c20df6aeab46070ba3af4f88789d51099a066bff22988d7813cf701ba5895154823b876596e93f69a5a4c005e1fbd216843
-
SSDEEP
24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8aoKXCoEDiMWJy7:cTvC/MTQYxsWR7aoKXC1in
Static task
static1
Behavioral task
behavioral1
Sample
89A630080AAAD5154B8900721033B9BB65CE27BEEB389D50EE50B216FB394871.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ultraflex.com.mx - Port:
21 - Username:
[email protected] - Password:
Jgj8-p4Z]a1b
Targets
-
-
Target
89A630080AAAD5154B8900721033B9BB65CE27BEEB389D50EE50B216FB394871
-
Size
100.0MB
-
MD5
b8a6ae8a737a421280af1f04ee30ac09
-
SHA1
3ca3e1e980eb13a788f6ca1ada931f2410951b6f
-
SHA256
89a630080aaad5154b8900721033b9bb65ce27beeb389d50ee50b216fb394871
-
SHA512
5798d3456272082508252fd264026c20df6aeab46070ba3af4f88789d51099a066bff22988d7813cf701ba5895154823b876596e93f69a5a4c005e1fbd216843
-
SSDEEP
24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8aoKXCoEDiMWJy7:cTvC/MTQYxsWR7aoKXC1in
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-