General
-
Target
de827d9f82d681f045c51f99b21f772ec0a3af4979b562704cfcf9095987f130
-
Size
518KB
-
Sample
220520-17qlmshhgq
-
MD5
be5b52a0d8273186b63ac79b521e9006
-
SHA1
16da9c4ea3dca59603049ea99a7de76eafbbeb79
-
SHA256
de827d9f82d681f045c51f99b21f772ec0a3af4979b562704cfcf9095987f130
-
SHA512
cd2c3565b56481647ee5946586b5aa9ed4e92e963567803aeda46eb671a5919c596f34da5668e3214cfd6d5c535fa9088a38ab7c2dc059e3f148595ee3bf3a1e
Static task
static1
Behavioral task
behavioral1
Sample
PMT.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PMT.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ciftci.com.tr/ - Port:
21 - Username:
[email protected] - Password:
Wefullground2#
Protocol: ftp- Host:
ftp://ftp.ciftci.com.tr/ - Port:
21 - Username:
[email protected] - Password:
Wefullground2#
Extracted
Protocol: ftp- Host:
ftp.ciftci.com.tr - Port:
21 - Username:
[email protected] - Password:
Wefullground2#
Targets
-
-
Target
PMT.exe
-
Size
641KB
-
MD5
7bf2c1a3e369148e2e59280a91c23abd
-
SHA1
769b19e5208760910a25e59508f6b4258ce0f7ee
-
SHA256
0e7d9a0423e2abe849c313d741de58cb172512f0b81ca56680a0c98bcc5a28e8
-
SHA512
e616f4599ec00843a7a28557a7af5aea18ed0ce4eaf97596aa3a25b3380817d2c4c5a62817bfd29d16d7d19aab177bdbba71b00242eb2836100512b1082004dc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-