General
-
Target
4f82e0eba4655665a94f1a8c171e24d3852a33b121a5792348f143fa117ebc6f.exe
-
Size
715KB
-
Sample
221207-q8849sac2v
-
MD5
78584c3f3cc4c8003211291137168fe5
-
SHA1
33c5fc8ae41234a180469610949e2478cc599367
-
SHA256
4f82e0eba4655665a94f1a8c171e24d3852a33b121a5792348f143fa117ebc6f
-
SHA512
1be1b15c20945594c506ab4962cf8cd442a9defae6ece126af180e620c5c9755c63b306497e601e30c0df85a09887988c776bbcf9963abcf4255fce63036232a
-
SSDEEP
12288:qf/U/5s5BwQlHJ6Wj+yFPPjjsI9SMVzGrFYGV1YjncjZnbCkIF:f/5DQZJzBPjjHVzgO0YwjZnbCkI
Static task
static1
Behavioral task
behavioral1
Sample
4f82e0eba4655665a94f1a8c171e24d3852a33b121a5792348f143fa117ebc6f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4f82e0eba4655665a94f1a8c171e24d3852a33b121a5792348f143fa117ebc6f.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://41.216.183.100 - Port:
21 - Username:
ftplogs11 - Password:
Price123
Targets
-
-
Target
4f82e0eba4655665a94f1a8c171e24d3852a33b121a5792348f143fa117ebc6f.exe
-
Size
715KB
-
MD5
78584c3f3cc4c8003211291137168fe5
-
SHA1
33c5fc8ae41234a180469610949e2478cc599367
-
SHA256
4f82e0eba4655665a94f1a8c171e24d3852a33b121a5792348f143fa117ebc6f
-
SHA512
1be1b15c20945594c506ab4962cf8cd442a9defae6ece126af180e620c5c9755c63b306497e601e30c0df85a09887988c776bbcf9963abcf4255fce63036232a
-
SSDEEP
12288:qf/U/5s5BwQlHJ6Wj+yFPPjjsI9SMVzGrFYGV1YjncjZnbCkIF:f/5DQZJzBPjjHVzgO0YwjZnbCkI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-