General
-
Target
3996fdec3ceac6027730777ec99f6870a9c76e3904a1d2c78cef954a7484090e.exe
-
Size
525KB
-
Sample
241002-gktv1azgll
-
MD5
0fd28ed18e522b9eef69b57aa8bdbf8f
-
SHA1
5eba649f7e0cead07e1788973b9deae4c54e7a46
-
SHA256
3996fdec3ceac6027730777ec99f6870a9c76e3904a1d2c78cef954a7484090e
-
SHA512
35c1798d1088999a2c605134525fc6d17bcbf5c9f25910c295992f9fa599965a857505f0570614b62de65cd9a24525636f6144d20f014e2e661df781c45b90d9
-
SSDEEP
12288:zjEd+1wfcT78ZE9mBMnliO+CDbX1AlVtFtu6B:zjEdRfcT78ZE9munli/CDbXulDHu6B
Static task
static1
Behavioral task
behavioral1
Sample
3996fdec3ceac6027730777ec99f6870a9c76e3904a1d2c78cef954a7484090e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3996fdec3ceac6027730777ec99f6870a9c76e3904a1d2c78cef954a7484090e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.alternatifplastik.com - Port:
21 - Username:
[email protected] - Password:
Fineboy777@
Targets
-
-
Target
3996fdec3ceac6027730777ec99f6870a9c76e3904a1d2c78cef954a7484090e.exe
-
Size
525KB
-
MD5
0fd28ed18e522b9eef69b57aa8bdbf8f
-
SHA1
5eba649f7e0cead07e1788973b9deae4c54e7a46
-
SHA256
3996fdec3ceac6027730777ec99f6870a9c76e3904a1d2c78cef954a7484090e
-
SHA512
35c1798d1088999a2c605134525fc6d17bcbf5c9f25910c295992f9fa599965a857505f0570614b62de65cd9a24525636f6144d20f014e2e661df781c45b90d9
-
SSDEEP
12288:zjEd+1wfcT78ZE9mBMnliO+CDbX1AlVtFtu6B:zjEdRfcT78ZE9munli/CDbXulDHu6B
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-