General
-
Target
813ed1ec6506951c414a1adfd24e6f4660c33e79b5790045a02404787e00b3d9
-
Size
834KB
-
Sample
250109-bh1yms1pbv
-
MD5
466c5b6f2d24de81467ecbdea1ca0688
-
SHA1
1371271f6312c737f138382290132321d6f9842c
-
SHA256
813ed1ec6506951c414a1adfd24e6f4660c33e79b5790045a02404787e00b3d9
-
SHA512
4b4a238b3c05b323d6a74698b4f60a305b055ea477e23cd44405ae71a628df25c7856255692817680c64d2f2cce6401b3db72cf0d7345a3d2559a5b0580d8563
-
SSDEEP
24576:S0haTfRHl1FWVyUgM9lNvJ+0yoFzJ4dtlCHK:S0G3oVyUTpv7yod4WK
Behavioral task
behavioral1
Sample
transferencia_BBVA_97866456345354678976543425678.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
(=8fPSH$KO_!
Targets
-
-
Target
transferencia_BBVA_97866456345354678976543425678.exe
-
Size
858KB
-
MD5
5625cbf471e51e71ede214a1236ca612
-
SHA1
d07a68d0d95ad9855d096e3e8ea680e31afd7e7f
-
SHA256
e5b6cda78a342ea9f8f9f62853995a251ef13ce90dbd18a80195f460852a94e6
-
SHA512
2fe51828e092723dad0add4601c01279478c34af3cdee530bc03005ef912e8e438b584b45cbdb7b6682d4a14b801267835f65f4b4b1edf477093fbf11ea4d090
-
SSDEEP
24576:5iUmSB/o5d1ubcvi0X6qMhXRqOyzrNMZBZT:5/mU/ohubcvi9xXk1zpMZB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-