General
-
Target
865cf5013a56a0576a1e837aae17f8ed232c6d43e21f91cecd31d21679f562be
-
Size
520KB
-
Sample
231207-ctep8aadc8
-
MD5
7eae5a91d3e871ea0c920f486e1343b4
-
SHA1
74d80650070db49cb7da707666213c4d250e4190
-
SHA256
865cf5013a56a0576a1e837aae17f8ed232c6d43e21f91cecd31d21679f562be
-
SHA512
8bd825dca93e2cc74264ba964c5ffcf11f6553dd34a8c5cf7fb92077ead4f40842616bd9d099320a5816ee79cd0cbfda509b2aac57475d61a763945a57e0570b
-
SSDEEP
12288:O0KVGTm0Ho8ayWTYXtqH1JF3xYJA555dj9v/3YEn1:/TpIPyBXq1/31555d5vdn1
Static task
static1
Behavioral task
behavioral1
Sample
865cf5013a56a0576a1e837aae17f8ed232c6d43e21f91cecd31d21679f562be.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
865cf5013a56a0576a1e837aae17f8ed232c6d43e21f91cecd31d21679f562be.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://files.000webhost.com - Port:
21 - Username:
tain00 - Password:
computer@2020
Extracted
Protocol: ftp- Host:
files.000webhost.com - Port:
21 - Username:
tain00 - Password:
computer@2020
Targets
-
-
Target
865cf5013a56a0576a1e837aae17f8ed232c6d43e21f91cecd31d21679f562be
-
Size
520KB
-
MD5
7eae5a91d3e871ea0c920f486e1343b4
-
SHA1
74d80650070db49cb7da707666213c4d250e4190
-
SHA256
865cf5013a56a0576a1e837aae17f8ed232c6d43e21f91cecd31d21679f562be
-
SHA512
8bd825dca93e2cc74264ba964c5ffcf11f6553dd34a8c5cf7fb92077ead4f40842616bd9d099320a5816ee79cd0cbfda509b2aac57475d61a763945a57e0570b
-
SSDEEP
12288:O0KVGTm0Ho8ayWTYXtqH1JF3xYJA555dj9v/3YEn1:/TpIPyBXq1/31555d5vdn1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-