General
-
Target
pay.exe
-
Size
1.1MB
-
Sample
220909-j15csaggd2
-
MD5
519546d1948e6a9b175de49c9d802efe
-
SHA1
43c0f9bbb62f00dd9c8f10e8eecc0c72ef25aeb6
-
SHA256
2e59872a2d3fbed958f7e576b8b5f769d08eb45fcfd0dbb661847c9c6c7016fa
-
SHA512
f12ac301703369e5c6f21086c3548292a697cff054e368d03be22ed8f777e53c730b6e445a5727e4e592f28e27a98e06c0a97d5dbfec691ddd6b001cb713a10a
-
SSDEEP
12288:4kNjmHx175CFyHhi8q1YLL4Y+lUrJU0OTEnARmPT6ICIommv55:4kxmHDcohiB16L4rUtUPTEAgGICz5B5
Static task
static1
Behavioral task
behavioral1
Sample
pay.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
pay.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
pay.exe
-
Size
1.1MB
-
MD5
519546d1948e6a9b175de49c9d802efe
-
SHA1
43c0f9bbb62f00dd9c8f10e8eecc0c72ef25aeb6
-
SHA256
2e59872a2d3fbed958f7e576b8b5f769d08eb45fcfd0dbb661847c9c6c7016fa
-
SHA512
f12ac301703369e5c6f21086c3548292a697cff054e368d03be22ed8f777e53c730b6e445a5727e4e592f28e27a98e06c0a97d5dbfec691ddd6b001cb713a10a
-
SSDEEP
12288:4kNjmHx175CFyHhi8q1YLL4Y+lUrJU0OTEnARmPT6ICIommv55:4kxmHDcohiB16L4rUtUPTEAgGICz5B5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-