General
-
Target
692bc6c074e068e0bd9877b2b430cb2b901183254e25490013ddf3d6508e0bb3
-
Size
1024KB
-
Sample
240522-brgalafh23
-
MD5
dbd1621ca932ee174b5e71fc1b6e528c
-
SHA1
12f0a07d3741cbfdcb42795c50cb72256118c776
-
SHA256
692bc6c074e068e0bd9877b2b430cb2b901183254e25490013ddf3d6508e0bb3
-
SHA512
ea3d0883eb9bcdc0b8c91e8ecf5b66854b439fae6e3647ce0efd7cd5b796a6bd163ad44742a21843cd40e1fd1e671c45c712504d03d77601b02e2a28331f16cf
-
SSDEEP
24576:6AHnh+eWsN3skA4RV1Hom2KXMmHaTiqqb96An5:Nh+ZkldoPK8YaTNqbAo
Static task
static1
Behavioral task
behavioral1
Sample
692bc6c074e068e0bd9877b2b430cb2b901183254e25490013ddf3d6508e0bb3.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
692bc6c074e068e0bd9877b2b430cb2b901183254e25490013ddf3d6508e0bb3.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.corpsa.net - Port:
21 - Username:
[email protected] - Password:
-E~O8rekW5UT
Targets
-
-
Target
692bc6c074e068e0bd9877b2b430cb2b901183254e25490013ddf3d6508e0bb3
-
Size
1024KB
-
MD5
dbd1621ca932ee174b5e71fc1b6e528c
-
SHA1
12f0a07d3741cbfdcb42795c50cb72256118c776
-
SHA256
692bc6c074e068e0bd9877b2b430cb2b901183254e25490013ddf3d6508e0bb3
-
SHA512
ea3d0883eb9bcdc0b8c91e8ecf5b66854b439fae6e3647ce0efd7cd5b796a6bd163ad44742a21843cd40e1fd1e671c45c712504d03d77601b02e2a28331f16cf
-
SSDEEP
24576:6AHnh+eWsN3skA4RV1Hom2KXMmHaTiqqb96An5:Nh+ZkldoPK8YaTNqbAo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-