General
-
Target
1cb056af1cbe72af73f61fe8855dc0ae1eeb8258239699a5479d9854a5cfa28b
-
Size
685KB
-
Sample
230207-bapkmsgg43
-
MD5
22d56afe93db33cd0315f8fcba440266
-
SHA1
ba7ff424ec5f3228b968242fba5663313e2b442a
-
SHA256
1cb056af1cbe72af73f61fe8855dc0ae1eeb8258239699a5479d9854a5cfa28b
-
SHA512
90cb904bb0a1ab4c6d924a81e51d8299506267c31f3094f6616840b416697598e2d744764447525071b3abb909397bf494279265f45a854c611557b4a7bcaa7a
-
SSDEEP
12288:wibVtaouHH1JJ2iN+kejwFGfIlvxgjDh/qZ2Gl+APLW1bVV2HyLhDSvSr9zvsE2:w0ju1j1YeGQlKqZ2MS5vSOGve9
Static task
static1
Behavioral task
behavioral1
Sample
1cb056af1cbe72af73f61fe8855dc0ae1eeb8258239699a5479d9854a5cfa28b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1cb056af1cbe72af73f61fe8855dc0ae1eeb8258239699a5479d9854a5cfa28b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mgcpakistan.com - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Targets
-
-
Target
1cb056af1cbe72af73f61fe8855dc0ae1eeb8258239699a5479d9854a5cfa28b
-
Size
685KB
-
MD5
22d56afe93db33cd0315f8fcba440266
-
SHA1
ba7ff424ec5f3228b968242fba5663313e2b442a
-
SHA256
1cb056af1cbe72af73f61fe8855dc0ae1eeb8258239699a5479d9854a5cfa28b
-
SHA512
90cb904bb0a1ab4c6d924a81e51d8299506267c31f3094f6616840b416697598e2d744764447525071b3abb909397bf494279265f45a854c611557b4a7bcaa7a
-
SSDEEP
12288:wibVtaouHH1JJ2iN+kejwFGfIlvxgjDh/qZ2Gl+APLW1bVV2HyLhDSvSr9zvsE2:w0ju1j1YeGQlKqZ2MS5vSOGve9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-