General
-
Target
24012025_0102_23012025_Comanda_PO_3296788003.img
-
Size
2.0MB
-
Sample
250124-bd2dlstmaq
-
MD5
616dc7c8572ac62a84da1e520bc7f168
-
SHA1
78cdb4b53832e27ff3591945cf7532bffb9e6e24
-
SHA256
5c89ae8cf2f1416f78080c8511f455ebe8302061ad6370823f50c945900fa09e
-
SHA512
bfabb999f3c0a10167af188b320aedd8f7efefc688de5dddd386c38020c0aea5ad587fe24cb31ec4255476387d5e0f4a000b0b414fdabae7df9d735d92e9c403
-
SSDEEP
24576:HmwBXOxw33BYQ+0EnWF9gfJmc6Ns2VDdAVjaP+4a8ztxQX8F9toOSZD98+/1c:bXtY0iJ56nVQjaLa8ztisXuRg
Static task
static1
Behavioral task
behavioral1
Sample
Tangforlsendes.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.carbognin.it - Port:
21 - Username:
[email protected] - Password:
59Cif8wZUH#X
Targets
-
-
Target
Tangforlsendes.exe
-
Size
1.5MB
-
MD5
2a3b0c09fb6332a4c35439c0741a3c61
-
SHA1
1de70829cc27202b8b64235fb19829d32ac72ee1
-
SHA256
67e5c1745d2c3382e6f20e2d7cd876acb687f7859aae4cd2b6b9fae6ca5a441e
-
SHA512
901b724023e0ed87ddd483dae7c2c6c2269bb7115f1bfbf87a0b45efd77e20b7bcab183f60b1784ef92d86a6f04e76e719fe2a4d25794304ccc6aebd4bcd7f25
-
SSDEEP
24576:vmwBXOxw33BYQ+0EnWF9gfJmc6Ns2VDdAVjaP+4a8ztxQX8F9toOSZD98+/1c:DXtY0iJ56nVQjaLa8ztisXuRg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-