General
-
Target
4e5ef8e38b17fdf30961f28d4b5e2e23.chm
-
Size
14KB
-
Sample
220520-cbrbasebb7
-
MD5
4e5ef8e38b17fdf30961f28d4b5e2e23
-
SHA1
a7da3f869505242eb93c6bb07bc7cc76b6a5d71b
-
SHA256
f0c20d4ea2e2cc1d3c9df58b1a4854f9e3b761b7cd0c26860559289c74a8d50f
-
SHA512
c33cfc30c355dcb2638a7835986572c3da27b12cbb6c4a3773fbd1ce03e2c5b1710e15f1a15253f2951455eae53e71b5837dcc4176ace40bf43326b72e846f7c
Static task
static1
Behavioral task
behavioral1
Sample
4e5ef8e38b17fdf30961f28d4b5e2e23.chm
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4e5ef8e38b17fdf30961f28d4b5e2e23.chm
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://pacurariu.com/F37.jpg
Extracted
Protocol: ftp- Host:
ftp.jordi-spedition.com - Port:
21 - Username:
[email protected] - Password:
asdqwe123!@#
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jordi-spedition.com/ - Port:
21 - Username:
[email protected] - Password:
asdqwe123!@#
Targets
-
-
Target
4e5ef8e38b17fdf30961f28d4b5e2e23.chm
-
Size
14KB
-
MD5
4e5ef8e38b17fdf30961f28d4b5e2e23
-
SHA1
a7da3f869505242eb93c6bb07bc7cc76b6a5d71b
-
SHA256
f0c20d4ea2e2cc1d3c9df58b1a4854f9e3b761b7cd0c26860559289c74a8d50f
-
SHA512
c33cfc30c355dcb2638a7835986572c3da27b12cbb6c4a3773fbd1ce03e2c5b1710e15f1a15253f2951455eae53e71b5837dcc4176ace40bf43326b72e846f7c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-