General
-
Target
839cccac7787eee274a7915f806528d73efe83b9f3c7e506cff110f2fbde4791
-
Size
708KB
-
Sample
240428-bdmv8acg51
-
MD5
7de26bf7834bfa20ead0dea7ef259735
-
SHA1
7ee77b8473207b5aa764fed84292b4e56cc96e17
-
SHA256
839cccac7787eee274a7915f806528d73efe83b9f3c7e506cff110f2fbde4791
-
SHA512
7e40c802baf19d7516e42b1b0a64e852112bdaba36bd093296b10930d7fcbef01ac0ae7715ae809a7325745ffb011e266800c97a0859f54df047ce1a5a44315a
-
SSDEEP
12288:DWYIPXjxannnHg2hoDJKcbld8JIzbETjRpYhod3gChheQxeQ9+CWDV:DWYIPFannnHg2AJBRGJIajRpyq39hzEp
Static task
static1
Behavioral task
behavioral1
Sample
839cccac7787eee274a7915f806528d73efe83b9f3c7e506cff110f2fbde4791.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
839cccac7787eee274a7915f806528d73efe83b9f3c7e506cff110f2fbde4791.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://eu-west-1.sftpcloud.io - Port:
21 - Username:
64c972c69bef4d24b6a8140c66c10f0a - Password:
2S39TYnNmuLXjVyhLq8dhVRX7Wul6UwJ
Targets
-
-
Target
839cccac7787eee274a7915f806528d73efe83b9f3c7e506cff110f2fbde4791
-
Size
708KB
-
MD5
7de26bf7834bfa20ead0dea7ef259735
-
SHA1
7ee77b8473207b5aa764fed84292b4e56cc96e17
-
SHA256
839cccac7787eee274a7915f806528d73efe83b9f3c7e506cff110f2fbde4791
-
SHA512
7e40c802baf19d7516e42b1b0a64e852112bdaba36bd093296b10930d7fcbef01ac0ae7715ae809a7325745ffb011e266800c97a0859f54df047ce1a5a44315a
-
SSDEEP
12288:DWYIPXjxannnHg2hoDJKcbld8JIzbETjRpYhod3gChheQxeQ9+CWDV:DWYIPFannnHg2AJBRGJIajRpyq39hzEp
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-