General
-
Target
9ee2f3872f0b56d35c7f5183350cbc6528bcfd02e35ff1a4d20ece9aafdab45d
-
Size
22KB
-
Sample
240926-sdyq6awfjb
-
MD5
36e9c180f4a5610f4bb8261350470156
-
SHA1
d3a714c6df7728ebb8b6e962476ebbc1b638a1e6
-
SHA256
9ee2f3872f0b56d35c7f5183350cbc6528bcfd02e35ff1a4d20ece9aafdab45d
-
SHA512
978e8055ec013081027c6568b062730b203319feb362391c202ed92e62d5002ea8be4359ce3ef8b39173760dcccf80a0cb29e77cf3c40de3d1de19139e675b17
-
SSDEEP
384:c2XazDGpzRHWptwto+e6A5HuSv2NrkOkSHtXFbLg7Lu9eXlqK9bBnnj7hHUBBw76:7qzDqHKH6rtXF4G9e3xBjNowVo
Static task
static1
Behavioral task
behavioral1
Sample
Teklif-u9862874-uue28736788uue.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Teklif-u9862874-uue28736788uue.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.alternatifplastik.com - Port:
21 - Username:
[email protected] - Password:
Fineboy777@
Targets
-
-
Target
Teklif-u9862874-uue28736788uue.exe
-
Size
54KB
-
MD5
887454c6c1c2025d9da1d49ee4a5afac
-
SHA1
2bb69481d8e81181bd1fcd20ebbd75a8089318ed
-
SHA256
42544dd4b80c2d0a040c4167540129777a2d7a2e3780adf2b2a580a6dca6c30a
-
SHA512
a483c87ff0b4e29c31511cf67343b2ce9667fbac1d7cb115120bfaaa14513316a78db4459919d85ea04f5a62d0fec303237f6306b8b18b4443ef3b8695046a22
-
SSDEEP
768:N2osf6uFApu+Rofb0TGaJHL8Ik8Aql/FoTtVb8wqLCNMTXz0Mbd7MZvtujz1D3u:N2osCuFA3ofbOGc8CdqtGLXpMD61D+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-