General
-
Target
8aa3ae07b9dbb1c93871683ab9182cfab41c8c7680f2d12498262e728ffc3ae5
-
Size
522KB
-
Sample
250123-bfyqhavkas
-
MD5
88d9433ee99d0ab08a5d15111ebcb5f6
-
SHA1
f60062e588af49537b938afa7c1f7a06df4ea8bb
-
SHA256
8aa3ae07b9dbb1c93871683ab9182cfab41c8c7680f2d12498262e728ffc3ae5
-
SHA512
bfbb5712f59e19736c537deb1b66042bf9ad66611da52f5f1b60360502b7c3fdd479f43fe5efd9fe825f9031ea801a10da757c5324f6c8c131d0c86780729f76
-
SSDEEP
12288:FUAy2p3FI1rrLC/KRQpnNMhQksxRCaR4EGNsedUIlm/oYsT5m:SmVINlmNMCNxRCaR4EY93m/orTY
Behavioral task
behavioral1
Sample
COTIZACIÓN2025-003709.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.solucionesmexico.mx - Port:
21 - Username:
[email protected] - Password:
dGG^ZYIxX5!B
Targets
-
-
Target
COTIZACIÓN2025-003709.exe
-
Size
547KB
-
MD5
acb06788c73e433473a545fe83823023
-
SHA1
4f5f29eea50f6c4b1ad966af8d0761857d3cdc95
-
SHA256
e6ca722fb31f1c9f6db25e77b2661ffddc55d8a3a4ce2ef3be7f6c65523d7554
-
SHA512
127f0302e2eac5d725337d22a520b35b92c821673b26f5be941eca165c41660bfefa542e0b50c5d1d582ba90d1c0c7774ee268b9f64e86df28b160a7d6ae659b
-
SSDEEP
12288:XozGdX0M4ornOmZIzfMwHHQmRROXKWXUmd1Ph2TIoOCJRw63kLRgdbihJ:X4GHnhIzOaWXU0F4OiRPkN8cJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-