General
-
Target
dfc88a456dc13136aa28d368c0583237
-
Size
924KB
-
Sample
240326-wrdvpage43
-
MD5
dfc88a456dc13136aa28d368c0583237
-
SHA1
f1a5186b63002143a7473173723113d770a5aa1e
-
SHA256
8c5b43b0e8a36c7522180ca43e43868972cffd9b50e5bbac32694d7aecf4448c
-
SHA512
2b672e0483e5b1639d08ba006b5224763c9db0de49f5a62679612bc29c3e2d333e2e02979993ef80f01995511797cdfbe48da659f0b43f638a6bb1d1d1b4432d
-
SSDEEP
12288:eFcsGI/cD8RWiCod1+i84gica+9/T46astY3pFUrX0E1vfOKrr235PzdJIr22EOQ:e1gizdQiPgbaekji3vfp23Zzcr2
Static task
static1
Behavioral task
behavioral1
Sample
dfc88a456dc13136aa28d368c0583237.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
dfc88a456dc13136aa28d368c0583237.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.alighierieventos.com/ - Port:
21 - Username:
[email protected] - Password:
7Le20=0C=pOa
Targets
-
-
Target
dfc88a456dc13136aa28d368c0583237
-
Size
924KB
-
MD5
dfc88a456dc13136aa28d368c0583237
-
SHA1
f1a5186b63002143a7473173723113d770a5aa1e
-
SHA256
8c5b43b0e8a36c7522180ca43e43868972cffd9b50e5bbac32694d7aecf4448c
-
SHA512
2b672e0483e5b1639d08ba006b5224763c9db0de49f5a62679612bc29c3e2d333e2e02979993ef80f01995511797cdfbe48da659f0b43f638a6bb1d1d1b4432d
-
SSDEEP
12288:eFcsGI/cD8RWiCod1+i84gica+9/T46astY3pFUrX0E1vfOKrr235PzdJIr22EOQ:e1gizdQiPgbaekji3vfp23Zzcr2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-