General
-
Target
ANALYSE Nr. AR001-pdf.img
-
Size
1.2MB
-
Sample
230613-jtfqvafd99
-
MD5
9e2d4e1bb29c036814ffacf857731ad3
-
SHA1
61b4dc26785f41f9a64688db914fe21a560808fc
-
SHA256
9b9fd4e75521dbc8f66f3e137f43f844072a17c702bacd52719ad22bcb901ea3
-
SHA512
2cbacafb6bc509107c61913700c781b316a3f93d5bf12e99c61111cfa935ffaa316dbdfd2843d3a858cd861e2637fd4be5a72e3a6ca93302b5b7fae1b57f8ba7
-
SSDEEP
12288:w4dcTbsYoYZ4X8IvoL+9OzYoAG94gW2s:g+YlIvoLYQYoAfgW
Static task
static1
Behavioral task
behavioral1
Sample
ANALYSE_.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ANALYSE_.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Targets
-
-
Target
ANALYSE_.EXE
-
Size
306KB
-
MD5
cdd187b140f787efa951fab18d274cfc
-
SHA1
04dd7b20c6ed955f23a745b18a6cf3ffdd1a6f94
-
SHA256
b3a1509f77da1f09f79e2d0d6b6c6938db01f8ec67fa6adcf992eeb5b6b8698a
-
SHA512
1248e398a051f9a5f4ded802a34e84a3fb57c17a83ff8973498dfc28b6497834b426ef80d4ac5873bb3ae063ca176c594de3276568745678269ac049fd8a5cea
-
SSDEEP
6144:ux4vyP05yb7EuugWVZ+oYZ4X8Ivo2K+9OzYoAG94FGiVU1xiZc0I/sO:Y4dcTbsYoYZ4X8IvoL+9OzYoAG94gW2f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-