General
-
Target
tmp
-
Size
570KB
-
Sample
231120-vxwr1sac4y
-
MD5
65edafe0dc5427f4cec4e29ad9cb18bc
-
SHA1
b971a6aaf0c0daa035d9186b9cc49e72a5fc9976
-
SHA256
e68f725f8d131c3cc5e5cbac5bc454cd9c1848039ee706c975262ef2073e75d3
-
SHA512
a0c4bb45bd0dfa245a13502f0e51758ca2ec878a9eeec3ec0b82cdb2125981bf0de89f07c84029360676149bb61476345a032c9338bf9a3e304ea4e9e4e6b8fe
-
SSDEEP
12288:bXHfGsaMlvWCwqLRtT34We8Op0UHUpIPEGWQAwna:bXHe8BLRtTn52EG5Awna
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.experthvac.ro - Port:
21 - Username:
[email protected] - Password:
-8{jszMOY*Z8(~Za0#jyP%o7VoB.0)kk^)7_
Targets
-
-
Target
tmp
-
Size
570KB
-
MD5
65edafe0dc5427f4cec4e29ad9cb18bc
-
SHA1
b971a6aaf0c0daa035d9186b9cc49e72a5fc9976
-
SHA256
e68f725f8d131c3cc5e5cbac5bc454cd9c1848039ee706c975262ef2073e75d3
-
SHA512
a0c4bb45bd0dfa245a13502f0e51758ca2ec878a9eeec3ec0b82cdb2125981bf0de89f07c84029360676149bb61476345a032c9338bf9a3e304ea4e9e4e6b8fe
-
SSDEEP
12288:bXHfGsaMlvWCwqLRtT34We8Op0UHUpIPEGWQAwna:bXHe8BLRtTn52EG5Awna
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-