General
-
Target
e7864a121c2abe3f5398b03986d53cef01044dc8ba32e0cd30448d3ae8a78112
-
Size
428KB
-
Sample
231208-nq66vabe85
-
MD5
4c9af850d4330bf16c8f83c29ca3d815
-
SHA1
ac4351d1632fab668c03c391e1f67e0c64fe117d
-
SHA256
e7864a121c2abe3f5398b03986d53cef01044dc8ba32e0cd30448d3ae8a78112
-
SHA512
ff41ebcb04890d2a3b09118dd03d5b6fa17c4f7c6ddbc2832a470ea3435cf38fae873efecb6cff261469e09e2aeb97982bfa11d62bdb898dc0b5c3ad354beed1
-
SSDEEP
6144:Wv67updRtZ8YGvN7bnCRn6/H7+bU+A61stvLGyELbMUTKZ:EpdRtZzGvN7f7+B1SiyyjK
Behavioral task
behavioral1
Sample
e7864a121c2abe3f5398b03986d53cef01044dc8ba32e0cd30448d3ae8a78112.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e7864a121c2abe3f5398b03986d53cef01044dc8ba32e0cd30448d3ae8a78112.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.code-jet.com - Port:
21 - Username:
[email protected] - Password:
4+i)Wf,h^zRm
Extracted
Protocol: ftp- Host:
ftp.code-jet.com - Port:
21 - Username:
[email protected] - Password:
4+i)Wf,h^zRm
Targets
-
-
Target
e7864a121c2abe3f5398b03986d53cef01044dc8ba32e0cd30448d3ae8a78112
-
Size
428KB
-
MD5
4c9af850d4330bf16c8f83c29ca3d815
-
SHA1
ac4351d1632fab668c03c391e1f67e0c64fe117d
-
SHA256
e7864a121c2abe3f5398b03986d53cef01044dc8ba32e0cd30448d3ae8a78112
-
SHA512
ff41ebcb04890d2a3b09118dd03d5b6fa17c4f7c6ddbc2832a470ea3435cf38fae873efecb6cff261469e09e2aeb97982bfa11d62bdb898dc0b5c3ad354beed1
-
SSDEEP
6144:Wv67updRtZ8YGvN7bnCRn6/H7+bU+A61stvLGyELbMUTKZ:EpdRtZzGvN7f7+B1SiyyjK
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-