General
-
Target
0268b237f3738d459b9664a4909bc6d7
-
Size
751KB
-
Sample
231225-dsz57shhg2
-
MD5
0268b237f3738d459b9664a4909bc6d7
-
SHA1
a485b1aeac22acca629f60e003060280a6baa393
-
SHA256
d010ab75de0b125cd7a9ab9687881be8e448d01afd360d9d476146314f413e86
-
SHA512
d26ca920cef62121dbd8a9db8eaac6b199e6c328e0559cf25727f0b86233bc703e1c65486bc16aeafe5a800a7d3c6c323fbb5b7d120be5c51ed08d9208907d18
-
SSDEEP
12288:0sYPU9SPU996d3yVYJHJOsBgo0q4wM9hW16zvR9v5gyria01OuPVp2/BNm9pxlX7:0s+HJOsBgo0q4wMu1GRqiGlQm9p7Xav
Static task
static1
Behavioral task
behavioral1
Sample
0268b237f3738d459b9664a4909bc6d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0268b237f3738d459b9664a4909bc6d7.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.cosmolensky.com/ - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Targets
-
-
Target
0268b237f3738d459b9664a4909bc6d7
-
Size
751KB
-
MD5
0268b237f3738d459b9664a4909bc6d7
-
SHA1
a485b1aeac22acca629f60e003060280a6baa393
-
SHA256
d010ab75de0b125cd7a9ab9687881be8e448d01afd360d9d476146314f413e86
-
SHA512
d26ca920cef62121dbd8a9db8eaac6b199e6c328e0559cf25727f0b86233bc703e1c65486bc16aeafe5a800a7d3c6c323fbb5b7d120be5c51ed08d9208907d18
-
SSDEEP
12288:0sYPU9SPU996d3yVYJHJOsBgo0q4wM9hW16zvR9v5gyria01OuPVp2/BNm9pxlX7:0s+HJOsBgo0q4wMu1GRqiGlQm9p7Xav
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-