General
-
Target
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8
-
Size
403KB
-
Sample
231208-bk6xnsgd99
-
MD5
c081e925d1f5ffa3057680b76e354141
-
SHA1
fe2a4b9d382fffe418d34d101785ce7a787c6aa0
-
SHA256
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8
-
SHA512
14c554c4c2bccb5ce9299f4cbdf1bd1fd318d4e37ad77cbbf765ae04b539a896c33050c399cc0357ac74e3893a54805d5b2ceffbf5bc32ae4ecdb6b80b6ed6ae
-
SSDEEP
12288:D94/XlCUvQt1apQ7ERtLJ7N/vMmbCH/a9:DO5vzpvLJ7N3vCHS9
Static task
static1
Behavioral task
behavioral1
Sample
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.siscop.com.co - Port:
21 - Username:
[email protected] - Password:
+5s48Ia2&-(t
Targets
-
-
Target
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8
-
Size
403KB
-
MD5
c081e925d1f5ffa3057680b76e354141
-
SHA1
fe2a4b9d382fffe418d34d101785ce7a787c6aa0
-
SHA256
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8
-
SHA512
14c554c4c2bccb5ce9299f4cbdf1bd1fd318d4e37ad77cbbf765ae04b539a896c33050c399cc0357ac74e3893a54805d5b2ceffbf5bc32ae4ecdb6b80b6ed6ae
-
SSDEEP
12288:D94/XlCUvQt1apQ7ERtLJ7N/vMmbCH/a9:DO5vzpvLJ7N3vCHS9
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-