General
-
Target
FYI_22.7z
-
Size
6KB
-
Sample
221208-j4w6kscc9w
-
MD5
e3d9672c945bed35de2c0f2d13b7c650
-
SHA1
10c935f4302993ab96869b8af9b504942a19dc3e
-
SHA256
418cdd70eebf59fb709f1d8e476bd05fd62e1b1e7468ed905f39e141befd7c3f
-
SHA512
7ca46d17aeda035874cc5d042526f17ff82e8b08090f305c0e81bd367876d1c7eeb639c1ff00254acd5e1e096c3e2c6b7a97a2fb2ab793d73491c5bb9797136d
-
SSDEEP
192:S/mMAkN4fc9t3bHUrnLfEe7ATyYHWeD0q:S9Xm2bEEe7aDHWegq
Static task
static1
Behavioral task
behavioral1
Sample
mel9.chm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
mel9.chm
Resource
win10v2004-20220901-en
Malware Config
Extracted
https://cricot2.kylos.pl/mel9.txt
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.peva.it - Port:
21 - Username:
[email protected] - Password:
Team2318!@#
Targets
-
-
Target
mel9.chm
-
Size
13KB
-
MD5
e7a3bc55f52eebb6ce7df0a0047fec40
-
SHA1
b152e0d6abc8dab4500aaa4161dac968e54cad20
-
SHA256
908d78eb614a8ecf652163a4ccbdf62deec33d03747d4342d4f90e5bcf7995d8
-
SHA512
3537fee98df7a02510e65c4a7fbe302e154d37e5ea497fe2677936f3442afc565a4a6307a870971ca3f45a8d25bee50b71a04c515664737cbe72d4031a186a81
-
SSDEEP
192:8FYhJztroZ7rRXcAU9aoSpW9KZYtsufMCKv6:gYjtroZ7rAv9yYtsuFKv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-