General
-
Target
1dca538763d8b13f4eb4a059e9a98e3a.bin
-
Size
663KB
-
Sample
240329-blppsaeb85
-
MD5
fb909fd81af7f439b2f783189da7c368
-
SHA1
de6aa1af922b7d59f2fcf31666b6fb03e288c2b8
-
SHA256
de45da1e011effac1cceac2fbef4433c2e914cd7d09efc5f8aaad5d588d9274a
-
SHA512
0fba43ab86a8b9636ddc604257d36ee254a78ca81079a8e77f0457a23c49d8974762faf52e39f2f07a350d2abec311964770aeda6fdee7f173ebd81bee58eba0
-
SSDEEP
12288:Q6vfs0AXulnrVpZORp0tewUBeqaR2+zfiH8pV9QcY8t8PJBmdOujnqA:Q6vfs0AYYT0tFUHT+zqH8pV9dzuhBmd7
Static task
static1
Behavioral task
behavioral1
Sample
0353461e3456838001ee98fd63e0df5563fab3836b26600059e4deed142a73f6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0353461e3456838001ee98fd63e0df5563fab3836b26600059e4deed142a73f6.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.normagroup.com.tr - Port:
21 - Username:
[email protected] - Password:
Kingdom12345@
Targets
-
-
Target
0353461e3456838001ee98fd63e0df5563fab3836b26600059e4deed142a73f6.exe
-
Size
740KB
-
MD5
1dca538763d8b13f4eb4a059e9a98e3a
-
SHA1
be4c6dcf98860463c94596a6febcd404ae1ffc22
-
SHA256
0353461e3456838001ee98fd63e0df5563fab3836b26600059e4deed142a73f6
-
SHA512
c8b6dd0f01e9667d13d09c8bdfd2d179bf1877b4f8c771d9e4b018f3452ad007583c1d3617154bdc02c43c8949ee42c0959015cd1270aa125cb2de314485823c
-
SSDEEP
12288:Rd1JsJ6Sj31Sh2iNw25j2T50NBEursHNtPZLsWajF6QWDBVpv+ONfLemSgTGKCP0:Rdkw1G2prBbrsHN9ZLsNh1CBX3NzemjO
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-