General
-
Target
55273bb86eda9a403c0d0e7c2164694e57f5d73e5a3ba64b11f6892d3939edd2
-
Size
756KB
-
Sample
240712-brbecavfkg
-
MD5
cfe2fb1f0577846b88f709d0fedeee37
-
SHA1
a23f34fe198fd27d707ef5a61e5765c66d0feb51
-
SHA256
55273bb86eda9a403c0d0e7c2164694e57f5d73e5a3ba64b11f6892d3939edd2
-
SHA512
f4f4abf95350403b72583aeb9404defacc3c6fccadd6149b851b68836ec0826ed0811bbb1c6d403bb6b6109cb0a229d4c0af068b73ca47d3992e80251b1fba5b
-
SSDEEP
12288:6dRgYVK+orv4MZ0xaZsT/JLxlwd5b6FJwvIlNLLp8xInIUbutMZJbpS:6Lg1+RsydxleIPVjLpOcIUbuoJF
Static task
static1
Behavioral task
behavioral1
Sample
55273bb86eda9a403c0d0e7c2164694e57f5d73e5a3ba64b11f6892d3939edd2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
55273bb86eda9a403c0d0e7c2164694e57f5d73e5a3ba64b11f6892d3939edd2.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://backup.smartape.ru - Port:
21 - Username:
user889214 - Password:
RjYKRIRkfluo
Extracted
Protocol: ftp- Host:
backup.smartape.ru - Port:
21 - Username:
user889214 - Password:
RjYKRIRkfluo
Targets
-
-
Target
55273bb86eda9a403c0d0e7c2164694e57f5d73e5a3ba64b11f6892d3939edd2
-
Size
756KB
-
MD5
cfe2fb1f0577846b88f709d0fedeee37
-
SHA1
a23f34fe198fd27d707ef5a61e5765c66d0feb51
-
SHA256
55273bb86eda9a403c0d0e7c2164694e57f5d73e5a3ba64b11f6892d3939edd2
-
SHA512
f4f4abf95350403b72583aeb9404defacc3c6fccadd6149b851b68836ec0826ed0811bbb1c6d403bb6b6109cb0a229d4c0af068b73ca47d3992e80251b1fba5b
-
SSDEEP
12288:6dRgYVK+orv4MZ0xaZsT/JLxlwd5b6FJwvIlNLLp8xInIUbutMZJbpS:6Lg1+RsydxleIPVjLpOcIUbuoJF
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-