General
-
Target
2a28690f30aacafe7ca48d2cbff27b082aaaee624df3ad7825dcfdc15a96c589
-
Size
5KB
-
Sample
241018-bfcs2azdql
-
MD5
12ffcc184336f536356793394caebaf2
-
SHA1
ed44f4d7a786cbda094af3f5b30d8882e51b7b20
-
SHA256
2a28690f30aacafe7ca48d2cbff27b082aaaee624df3ad7825dcfdc15a96c589
-
SHA512
eb5aca31fd3ae9fbd406a509b46dc1a6eb64371df75960b31c923265ac7b6e7fa8a2e3d8851080817a00dd2111186881d1bdfb53833a02b3e51e88f4dd4edaf6
-
SSDEEP
96:oU51wGMc6FmskJsfCw1BTVJhEpt5FPXv9glImmn0HEb/T99Soq:oUkGB+OWaUBThmftv98ImBEX7zq
Static task
static1
Behavioral task
behavioral1
Sample
WG Quotation 11157061 DE-TR.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.alternatifplastik.com - Port:
21 - Username:
[email protected] - Password:
Fineboy777@
Targets
-
-
Target
WG Quotation 11157061 DE-TR.exe
-
Size
9KB
-
MD5
b82bdb9a9392c7049529723dcb93a75b
-
SHA1
e225b293e8007f73c0c83ea1d22825aec528c653
-
SHA256
2a1356b0d400e27c01c8cfe8db4c3bc5d225d4ac75fc445e154f373c406779a2
-
SHA512
0bf6403cee7b300ded290df47dad44b81a1225adfc4f0417efb8efadac133bc251c5380fd98e287bfc3415e0bddcede2033378f9cf39b4f0a7590556a0d1fbbc
-
SSDEEP
192:1c0IFiXp2vJwfFblxm0pzcIWr30I4HJKLKR/bkI/wC:1c0IFiwvGornqKedT/w
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-