General
-
Target
2732e42880d8c6a861cf2b2c3ebeb47304f1f1d4b09ea0a9ec5ae730b946c259
-
Size
1.2MB
-
Sample
231208-cmrffaaa2x
-
MD5
1c416c795d2acfdf876a6e96bbbb1c99
-
SHA1
c023b74808fd6ee76d4ee939642b1e101d5916a0
-
SHA256
2732e42880d8c6a861cf2b2c3ebeb47304f1f1d4b09ea0a9ec5ae730b946c259
-
SHA512
40d39a54edf87994dd345fe1dde5728b3e3cf1af941df535fae3ca0b4594f5cb6ae3c37cd62f049e9f983eb6988dc65e4394af54a1f1b8d160db22d775797951
-
SSDEEP
12288:3wFGHEXEzFGj9F5qx5DJlm2HlzYmdMylgimtdYM3O0V7bb:35HEXl9y1lrz7lgZtub0V7
Static task
static1
Behavioral task
behavioral1
Sample
COMANDA FINALAZD33166-pdf.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
COMANDA FINALAZD33166-pdf.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Targets
-
-
Target
COMANDA FINALAZD33166-pdf.exe
-
Size
699KB
-
MD5
9444e71802e12684478363233fd62c92
-
SHA1
f2b4bd9162b591b2a2f4202934145864e16053fb
-
SHA256
844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41
-
SHA512
fec573d2b453086f2ed0b8b11824e4626fb3712134a707f100b9b2704c489fffc1259646979b0c7ebeb032421163b35beed13d2772ac02a7dd08bf7723821805
-
SSDEEP
12288:WwFGHEXEzFGj9F5qx5DJlm2HlzYmdMylgimtdYM3O0V7bbJ:W5HEXl9y1lrz7lgZtub0V7B
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-