General
-
Target
d03b8c0fcbbdc16e4c7d5794c037ad639ce4c55aa42fc1905c179c4213d0b04f
-
Size
1.2MB
-
Sample
230303-tvb46ahh2t
-
MD5
6c2ca3d7accb6da47d068b0810fbce69
-
SHA1
4777ec71b0afe86075499b31b031e7944165679f
-
SHA256
d03b8c0fcbbdc16e4c7d5794c037ad639ce4c55aa42fc1905c179c4213d0b04f
-
SHA512
16f1b1fec42916f2e6298e174fd9d22ac2107403528d2809f2a44443dfb03fb1d335212955cfecc16327338fd1ee0f7e04b98bb6f167ffb02f278adcf7bc7a9d
-
SSDEEP
24576:qlLJ4SNTHDKDqe9Cre2xZBpyirq8YdSS:cLJ4SJDKDN9we2xZ7yiW9d
Static task
static1
Behavioral task
behavioral1
Sample
d03b8c0fcbbdc16e4c7d5794c037ad639ce4c55aa42fc1905c179c4213d0b04f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
d03b8c0fcbbdc16e4c7d5794c037ad639ce4c55aa42fc1905c179c4213d0b04f
-
Size
1.2MB
-
MD5
6c2ca3d7accb6da47d068b0810fbce69
-
SHA1
4777ec71b0afe86075499b31b031e7944165679f
-
SHA256
d03b8c0fcbbdc16e4c7d5794c037ad639ce4c55aa42fc1905c179c4213d0b04f
-
SHA512
16f1b1fec42916f2e6298e174fd9d22ac2107403528d2809f2a44443dfb03fb1d335212955cfecc16327338fd1ee0f7e04b98bb6f167ffb02f278adcf7bc7a9d
-
SSDEEP
24576:qlLJ4SNTHDKDqe9Cre2xZBpyirq8YdSS:cLJ4SJDKDN9we2xZ7yiW9d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-