General
-
Target
0b6652d43ca552e9e851fed9327cf429286cd9b58464c66d316591d38013e068
-
Size
512KB
-
Sample
220520-2pacdaffh5
-
MD5
dd8304a4167a6a75d93f107d6c403d7f
-
SHA1
d4d10e57773fe37d5aeb970a79587f90cf60e198
-
SHA256
0b6652d43ca552e9e851fed9327cf429286cd9b58464c66d316591d38013e068
-
SHA512
835cc5900de56f3938a66644c81d8d052b108ae35ec1d055ad86d4720ed5f77496528ca8dcb0477d5d583bae8347ad97f225635daba6429abdd8697617474945
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER#584532-pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
NEW ORDER#584532-pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.construccionesyaceros.com/ - Port:
21 - Username:
[email protected] - Password:
Um^[x+1a{piP
Protocol: ftp- Host:
ftp://ftp.construccionesyaceros.com/ - Port:
21 - Username:
[email protected] - Password:
Um^[x+1a{piP
Targets
-
-
Target
NEW ORDER#584532-pdf.exe
-
Size
546KB
-
MD5
307902f464ab56b98f667520dcd68295
-
SHA1
ebce226d5a550788a6ea39984a9521aff0892caf
-
SHA256
abce854dbb1be834088423c8a911d7111cd6d205b9f6b44be000652860fa03c6
-
SHA512
05bbe1ecd6e4a04908e840ef47290784fba812f69c9bfeb0a674a5ec54eff3702213445c6734bd8474ad88ea06b6aea89ea09344e80cacf5911c4e1642ab11a0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-