General
-
Target
ce7def9ad62f89e74447166ef435659df7b417cdd50cdf1bc4809b1f0b45f280
-
Size
758KB
-
Sample
250121-bmfhhayncn
-
MD5
50092614653e75e65a346821121f8619
-
SHA1
ee4f2752cf7be463da03b1f485b363c8ec25a9c4
-
SHA256
ce7def9ad62f89e74447166ef435659df7b417cdd50cdf1bc4809b1f0b45f280
-
SHA512
d871ade8e34970ed48f7e38703986369e28b1c224cd70812a892ef121a4dd8a8277e06c089a1f0fb73859f3a7f443924e4c45ebcd507d91e96e5e25ec390d6cf
-
SSDEEP
12288:PsNx+QKbK8kIyYCedTnjjCC+hqUXIyT3H5Pk+WFb0EpqA5PJRg3Lg2btSTpDJj5S:PU+Q7KyXety3hqYxDHhMFblq2REtS91A
Static task
static1
Behavioral task
behavioral1
Sample
orden de compra 548850-30-AG24_9767864534576890786564565768798.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
(=8fPSH$KO_!
Targets
-
-
Target
orden de compra 548850-30-AG24_9767864534576890786564565768798.exe
-
Size
1.1MB
-
MD5
0b1d780d8bbac7897f10e2c96d5c6381
-
SHA1
f7c3b462082b28825b0669ee11ec352a6227d671
-
SHA256
8b310e243ea5cf466a7788c4409c99e3a0d033bc2b0ea408822c3bd210164d70
-
SHA512
4c4f3ef9dadada9a60b3c38f72f10bc2d06d77274d2ab7d13673b218d2089d730427a96719102957a517f86d949919a47f5e9b23e4b8478ef90d231fc8e91935
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCszc4DwLF4DsV5EYpfu:7JZoQrbTFZY1iaCsz1cL24VeYE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-