General
-
Target
891070446c4fa23424efe03ec4b36dfeb8804e2cc68960666d5232ac4fd1baf8
-
Size
572KB
-
Sample
231207-czwwpaghcm
-
MD5
dca0841b0e46eb8282af160d0cdc6a55
-
SHA1
c25066e2b8d9714c491bf26d35461cd130aa8422
-
SHA256
891070446c4fa23424efe03ec4b36dfeb8804e2cc68960666d5232ac4fd1baf8
-
SHA512
86a107140a6689e4bdff2bccbb952b8ef141d02cda62504d37921852d2e627caf8de124e68ca6594960f3c1cb2e5e34a6d191f5d59ac0e0d384761616ffb2e82
-
SSDEEP
12288:g0KVGTm0Ho8ayWTYXtqH1JF3xYJA555dj9v/3YEn1:JTpIPyBXq1/31555d5vdn1
Static task
static1
Behavioral task
behavioral1
Sample
Documents as requested.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Documents as requested.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://files.000webhost.com - Port:
21 - Username:
tain00 - Password:
computer@2020
Extracted
Protocol: ftp- Host:
files.000webhost.com - Port:
21 - Username:
tain00 - Password:
computer@2020
Targets
-
-
Target
Documents as requested.exe
-
Size
520KB
-
MD5
7eae5a91d3e871ea0c920f486e1343b4
-
SHA1
74d80650070db49cb7da707666213c4d250e4190
-
SHA256
865cf5013a56a0576a1e837aae17f8ed232c6d43e21f91cecd31d21679f562be
-
SHA512
8bd825dca93e2cc74264ba964c5ffcf11f6553dd34a8c5cf7fb92077ead4f40842616bd9d099320a5816ee79cd0cbfda509b2aac57475d61a763945a57e0570b
-
SSDEEP
12288:O0KVGTm0Ho8ayWTYXtqH1JF3xYJA555dj9v/3YEn1:/TpIPyBXq1/31555d5vdn1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-