General
-
Target
9c2544296126fe6af77b4dd1109ddfecd7ed33f24d0aa3f1f1a467bc6753a5d5
-
Size
1.0MB
-
Sample
241217-beeagawpak
-
MD5
a5ff2ea478325c304b84fadb5173ac6f
-
SHA1
13f89e833786f96364ef99da6c7f6a80856245d3
-
SHA256
9c2544296126fe6af77b4dd1109ddfecd7ed33f24d0aa3f1f1a467bc6753a5d5
-
SHA512
efdc65f0625634d270e388e6fc195338860c6cfbeeee7d97a33aa0430d9f2c181f7db64c86b5aacba5066fde10a32d3f53126e446180116c3f2044165c7976c4
-
SSDEEP
24576:uu6J33O0c+JY5UZ+XC0kGso6FaL9lAkyZ8MmbtWY:gu0c++OCvkGs9FaL9lAkzMmUY
Static task
static1
Behavioral task
behavioral1
Sample
9c2544296126fe6af77b4dd1109ddfecd7ed33f24d0aa3f1f1a467bc6753a5d5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9c2544296126fe6af77b4dd1109ddfecd7ed33f24d0aa3f1f1a467bc6753a5d5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://backup.smartape.ru - Port:
21 - Username:
user894492 - Password:
w6NZOdcSkH1a
Targets
-
-
Target
9c2544296126fe6af77b4dd1109ddfecd7ed33f24d0aa3f1f1a467bc6753a5d5
-
Size
1.0MB
-
MD5
a5ff2ea478325c304b84fadb5173ac6f
-
SHA1
13f89e833786f96364ef99da6c7f6a80856245d3
-
SHA256
9c2544296126fe6af77b4dd1109ddfecd7ed33f24d0aa3f1f1a467bc6753a5d5
-
SHA512
efdc65f0625634d270e388e6fc195338860c6cfbeeee7d97a33aa0430d9f2c181f7db64c86b5aacba5066fde10a32d3f53126e446180116c3f2044165c7976c4
-
SSDEEP
24576:uu6J33O0c+JY5UZ+XC0kGso6FaL9lAkyZ8MmbtWY:gu0c++OCvkGs9FaL9lAkzMmUY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-