General
-
Target
EWHXClLVWa0H34Y.exe
-
Size
1.1MB
-
Sample
220908-gsljladgg9
-
MD5
d4ee556c937f4e2a322a5cd663e336c3
-
SHA1
7477dd9fe1f5afdfbf738657596a6ea9386656c9
-
SHA256
5cbfd2eba44cb556832215f980dd0401f63b009fa4b1c5bf2acb6c3c7c617960
-
SHA512
47eb800ca44e5daf895daa58fad4aa3c9edd4867ea7d649ffe63dafffcabbaa3e2f98bb437854f6627fcfe7ce68eb26e4ad2ef7c494f9575d98e17eace8f8ce7
-
SSDEEP
12288:JkNjm9x1iVDbvOOh5WEddzq8N4ldMteiLooQMpoXpGJrdI93YnM3mmiC1:Jkxm94DaoMMzqdQeURamW93YMx
Static task
static1
Behavioral task
behavioral1
Sample
EWHXClLVWa0H34Y.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
EWHXClLVWa0H34Y.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.bohotels.hu - Port:
587 - Username:
[email protected] - Password:
v4Jdahdirect
Extracted
agenttesla
Protocol: smtp- Host:
mail.bohotels.hu - Port:
587 - Username:
[email protected] - Password:
v4Jdahdirect - Email To:
[email protected]
Targets
-
-
Target
EWHXClLVWa0H34Y.exe
-
Size
1.1MB
-
MD5
d4ee556c937f4e2a322a5cd663e336c3
-
SHA1
7477dd9fe1f5afdfbf738657596a6ea9386656c9
-
SHA256
5cbfd2eba44cb556832215f980dd0401f63b009fa4b1c5bf2acb6c3c7c617960
-
SHA512
47eb800ca44e5daf895daa58fad4aa3c9edd4867ea7d649ffe63dafffcabbaa3e2f98bb437854f6627fcfe7ce68eb26e4ad2ef7c494f9575d98e17eace8f8ce7
-
SSDEEP
12288:JkNjm9x1iVDbvOOh5WEddzq8N4ldMteiLooQMpoXpGJrdI93YnM3mmiC1:Jkxm94DaoMMzqdQeURamW93YMx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-