General
-
Target
SME940805NE7_Orden de compra_2866_20250117.uu
-
Size
541KB
-
Sample
250120-sdn7qavmb1
-
MD5
6587c28843f9ff45eac85bb5bcf46fe7
-
SHA1
7e3b2d917af9c956155fe199fdb749643f23087f
-
SHA256
b33fab14654abd45db80294619ae0f63536e39ded9f7c8dd398ef8604b3a459e
-
SHA512
4f569440e10d699da6f3da492b21d8b1c4b3b9cc262fc1c371c52b702446517859b101c23d4f2d1b38ebdd207ff37a6609c65c394619343c54d226ba5ae5a425
-
SSDEEP
12288:FU/aKDtOaTiMfSv4MXKWILT8Pjz3QAn6ySp01a8ndR5yTCQ:FipxOawg+K70jz3Q+6Zpb8ndRcR
Static task
static1
Behavioral task
behavioral1
Sample
SME940805NE7_Orden de compra_2866_20250117.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.solucionesmexico.mx - Port:
21 - Username:
[email protected] - Password:
dGG^ZYIxX5!B
Targets
-
-
Target
SME940805NE7_Orden de compra_2866_20250117.exe
-
Size
1.0MB
-
MD5
e7a41d3a6376d834e88548ca8e2d5187
-
SHA1
0ac56ad806f92ad780ff4e64e8610b102944aabe
-
SHA256
72c492c3198f103c677df4abbbfcfc96a3f43126d9f8ef6426cd74e879405524
-
SHA512
20e18f647a2e227b4c44a564037f744de3b6d6b4c2a9ef0a983f74451e1e9f564334ee4ecdaefa981bcb1a1cf911e2260ea15a65c13140188ee2bc7bfb27757b
-
SSDEEP
12288:1CdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBgaOTeV0tHJKF:1Cdxte/80jYLT3U1jfsWa2eVLTLL+Q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-