General
-
Target
3165714f5f16835662fb323d43b1494a2f5744b68b880f3fb277167a26d6d3f5.uue
-
Size
489KB
-
Sample
241002-j86ktawdrl
-
MD5
38945329db52339f3e89a19d2a235781
-
SHA1
a8d38c2df912161a1a2c3332b49d0c723d4ecbe8
-
SHA256
3165714f5f16835662fb323d43b1494a2f5744b68b880f3fb277167a26d6d3f5
-
SHA512
d7c8e8a95ddc133a26e701fad5b1f887a6f6b5110ce96642a1bf5082eeda488c27dbe629624815bb1ce7a3a0e27b4c67fedfe169305295663dbe0128b6dd9608
-
SSDEEP
12288:4pQumzeyc1584qalAMXcnSt4ZkSHepQNgt1rKbGW:KQEv584qaF0S+ZkSMthOGW
Static task
static1
Behavioral task
behavioral1
Sample
PO - WWS I - CALPX24090048.pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.gizemetiket.com.tr - Port:
21 - Username:
pgizemM6 - Password:
giz95Ffg
Targets
-
-
Target
PO - WWS I - CALPX24090048.pdf.exe
-
Size
100.0MB
-
MD5
1c7e0fd7bfb418cb0f4e48133da91a6c
-
SHA1
9abc0288a1035d9afd80c5bc75c5ef5efa7c082b
-
SHA256
59c9af03107ab7b7a6fc0e4a8ba8402bb6d5ca8c5b8f2dea12c252600c70c381
-
SHA512
2cb4d7a3deb89349280d3fb857c6dcb2f1a1ce6076d6f4b25db7d90aa44cf34dd24bfade1dc1b85d5f9ec95436f78b9d3f83aed9761c72469af16080afdf097f
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLTORumP6q9VhYSGbdzuK/VLFE:ffmMv6Ckr7Mny5QLfmP6q9VhYSGbh5F
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-