General
-
Target
ca9ce774706c2f1708af10d3da19be03
-
Size
635KB
-
Sample
240315-gba2jahc41
-
MD5
ca9ce774706c2f1708af10d3da19be03
-
SHA1
059fc99b8d6ff50f997d7acb1a0ccf55cc776605
-
SHA256
4f4b3dded538765e48f27d8bf0ef605572313a3f95f71f642daa53402abd8776
-
SHA512
b351dbb0eae5871f7996a46d004862c824fdc6f23bfb06cff6b55f3662fc453e890e5af94c0b02cbf513228be27e39a5f13ccade69b5bd3de4149af1f34ed760
-
SSDEEP
12288:DeMOEti1x8SlqOs9XU09GD4jPFAxfdd+12aXVnt:DGEtoll7uGDuwdUl
Static task
static1
Behavioral task
behavioral1
Sample
ca9ce774706c2f1708af10d3da19be03.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca9ce774706c2f1708af10d3da19be03.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://universalinks.net/ - Port:
21 - Username:
[email protected] - Password:
{lafa{u^wEx8
Targets
-
-
Target
ca9ce774706c2f1708af10d3da19be03
-
Size
635KB
-
MD5
ca9ce774706c2f1708af10d3da19be03
-
SHA1
059fc99b8d6ff50f997d7acb1a0ccf55cc776605
-
SHA256
4f4b3dded538765e48f27d8bf0ef605572313a3f95f71f642daa53402abd8776
-
SHA512
b351dbb0eae5871f7996a46d004862c824fdc6f23bfb06cff6b55f3662fc453e890e5af94c0b02cbf513228be27e39a5f13ccade69b5bd3de4149af1f34ed760
-
SSDEEP
12288:DeMOEti1x8SlqOs9XU09GD4jPFAxfdd+12aXVnt:DGEtoll7uGDuwdUl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-