General
-
Target
5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d
-
Size
343KB
-
Sample
230207-bjqjasca2v
-
MD5
383a66b236ca130567b944ded28acbb3
-
SHA1
1f32c099f88de3de17411232b469720de80b9568
-
SHA256
5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d
-
SHA512
12aa8017a36beef09fd08da0c5175c311dff38f25edd7a6a79e5ed5179cf75a8ee237c62b229e9ae74b8c004d7b1f401db952844e4feed7c39b3be5ff55eac23
-
SSDEEP
6144:gYa6Ydr4i+dYQy+/quTtshVOl9jqNmB0x+4/iew7ePphpRdCVXsy:gYqGi+36uTamvKmeNPphnkFV
Static task
static1
Behavioral task
behavioral1
Sample
5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mgcpakistan.com - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Targets
-
-
Target
5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d
-
Size
343KB
-
MD5
383a66b236ca130567b944ded28acbb3
-
SHA1
1f32c099f88de3de17411232b469720de80b9568
-
SHA256
5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d
-
SHA512
12aa8017a36beef09fd08da0c5175c311dff38f25edd7a6a79e5ed5179cf75a8ee237c62b229e9ae74b8c004d7b1f401db952844e4feed7c39b3be5ff55eac23
-
SSDEEP
6144:gYa6Ydr4i+dYQy+/quTtshVOl9jqNmB0x+4/iew7ePphpRdCVXsy:gYqGi+36uTamvKmeNPphnkFV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-