General
-
Target
1.exe
-
Size
29KB
-
Sample
240926-kb6d8axann
-
MD5
a016634929c4d57cc24719723a4cd65c
-
SHA1
91e7492b6d3e543f185c69846bd175a626a931f5
-
SHA256
182b161a951229364aef6e16d358beb00f285c9f146053471ad22e714eefa719
-
SHA512
5f36c1ad444af94dfd4ca1d4aef188049ffdcf2a336f58cfeead5a55176e580312d3944c229ed8b66cc852f0a4c86b711603ea34ff80ebf1df6a3f84d61a695a
-
SSDEEP
384:ANepKdJNF1oPvlsBrrFj95okNTvsYxksSvk0HFs0ZILHwz7A8iq8ziXuF:AcQ9F1oaBj95FkYmsScKZHGJt
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.alternatifplastik.com - Port:
21 - Username:
[email protected] - Password:
Fineboy777@
Targets
-
-
Target
1.exe
-
Size
29KB
-
MD5
a016634929c4d57cc24719723a4cd65c
-
SHA1
91e7492b6d3e543f185c69846bd175a626a931f5
-
SHA256
182b161a951229364aef6e16d358beb00f285c9f146053471ad22e714eefa719
-
SHA512
5f36c1ad444af94dfd4ca1d4aef188049ffdcf2a336f58cfeead5a55176e580312d3944c229ed8b66cc852f0a4c86b711603ea34ff80ebf1df6a3f84d61a695a
-
SSDEEP
384:ANepKdJNF1oPvlsBrrFj95okNTvsYxksSvk0HFs0ZILHwz7A8iq8ziXuF:AcQ9F1oaBj95FkYmsScKZHGJt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-