General
-
Target
1e9b8c2056adf69d35b941a8514df02180ec6b2ff81ce8011023ba33ec2be203
-
Size
1.1MB
-
Sample
230303-s3sw7shf3y
-
MD5
82b53e2367b8e24f487e62146933c57b
-
SHA1
9c996572c6f2a34685de3dda4dd3f5e8c63f7d58
-
SHA256
1e9b8c2056adf69d35b941a8514df02180ec6b2ff81ce8011023ba33ec2be203
-
SHA512
1974284c839932dca29c370444b8672e40f6bb84f7323df7755efaef6d3537f7b41aa92e818d772d2a2fc46098666edd3ec06d5b3dae6e858036e0200a4e08dd
-
SSDEEP
12288:G1KMnDvW+ccdJe2xoq+viLttbRDYbv2kSUwUrGgaqfbuh:6W+BdJeDq+KLttbp7gPy
Static task
static1
Behavioral task
behavioral1
Sample
1e9b8c2056adf69d35b941a8514df02180ec6b2ff81ce8011023ba33ec2be203.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
1e9b8c2056adf69d35b941a8514df02180ec6b2ff81ce8011023ba33ec2be203
-
Size
1.1MB
-
MD5
82b53e2367b8e24f487e62146933c57b
-
SHA1
9c996572c6f2a34685de3dda4dd3f5e8c63f7d58
-
SHA256
1e9b8c2056adf69d35b941a8514df02180ec6b2ff81ce8011023ba33ec2be203
-
SHA512
1974284c839932dca29c370444b8672e40f6bb84f7323df7755efaef6d3537f7b41aa92e818d772d2a2fc46098666edd3ec06d5b3dae6e858036e0200a4e08dd
-
SSDEEP
12288:G1KMnDvW+ccdJe2xoq+viLttbRDYbv2kSUwUrGgaqfbuh:6W+BdJeDq+KLttbp7gPy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-