General
-
Target
PO NO. P0008005.exe
-
Size
8KB
-
Sample
210817-c7rr51256x
-
MD5
1e621a8a257d325510d24f67ce352123
-
SHA1
f32e0824226e0e9d387f56c3f05f3d64481005dd
-
SHA256
12a978875dc90e03cbb76d024222abfdc8296ed675fca2e17ca6447ce7bf0080
-
SHA512
29a310a4d3cb27dedd7d2737e9585ae82b5b2cd647b15a62253e6ddcad9ea97a1170cb9f1a87042fdba351591f1c3a9aac6d2e9d4aef21d0b10a9bdfbebbde92
Static task
static1
Behavioral task
behavioral1
Sample
PO NO. P0008005.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
PO NO. P0008005.exe
Resource
win10v20210410
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.avatar.ps/ - Port:
21 - Username:
[email protected] - Password:
tpe2zfF]j0Xc
Targets
-
-
Target
PO NO. P0008005.exe
-
Size
8KB
-
MD5
1e621a8a257d325510d24f67ce352123
-
SHA1
f32e0824226e0e9d387f56c3f05f3d64481005dd
-
SHA256
12a978875dc90e03cbb76d024222abfdc8296ed675fca2e17ca6447ce7bf0080
-
SHA512
29a310a4d3cb27dedd7d2737e9585ae82b5b2cd647b15a62253e6ddcad9ea97a1170cb9f1a87042fdba351591f1c3a9aac6d2e9d4aef21d0b10a9bdfbebbde92
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-