General
-
Target
ba224a4ba38306a675c6b2567488634017dbcab8aee6ee0bd727d0e329e9e239
-
Size
689KB
-
Sample
240429-bmbvbaec8s
-
MD5
917c4f19408ea09ee9366002f2e77bf6
-
SHA1
09b9d1545889e38d7d9f8f63ca5ab3ad8651a304
-
SHA256
ba224a4ba38306a675c6b2567488634017dbcab8aee6ee0bd727d0e329e9e239
-
SHA512
4a66744bcdf485d724ba4eadf496379935ff8bf006ec8bbda4f034c45ef4a014bfec26efea2ab2da266147dd00521ee1e392e2c46635899f6b1c8cdf85269f5e
-
SSDEEP
12288:vYIPXjjOlMcW5hxtti8sQvX5L2pk56MU6ongQUph7HX6H+zl:vYIPfOlMNdievYk5HogQUpNCkl
Static task
static1
Behavioral task
behavioral1
Sample
ba224a4ba38306a675c6b2567488634017dbcab8aee6ee0bd727d0e329e9e239.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ba224a4ba38306a675c6b2567488634017dbcab8aee6ee0bd727d0e329e9e239.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://eu-west-1.sftpcloud.io - Port:
21 - Username:
8e065e20d50941049d65f96f62357139 - Password:
26esZMYm4svydFPPVNZDGTMnq25MRawd
Targets
-
-
Target
ba224a4ba38306a675c6b2567488634017dbcab8aee6ee0bd727d0e329e9e239
-
Size
689KB
-
MD5
917c4f19408ea09ee9366002f2e77bf6
-
SHA1
09b9d1545889e38d7d9f8f63ca5ab3ad8651a304
-
SHA256
ba224a4ba38306a675c6b2567488634017dbcab8aee6ee0bd727d0e329e9e239
-
SHA512
4a66744bcdf485d724ba4eadf496379935ff8bf006ec8bbda4f034c45ef4a014bfec26efea2ab2da266147dd00521ee1e392e2c46635899f6b1c8cdf85269f5e
-
SSDEEP
12288:vYIPXjjOlMcW5hxtti8sQvX5L2pk56MU6ongQUph7HX6H+zl:vYIPfOlMNdievYk5HogQUpNCkl
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-