General
-
Target
tmp
-
Size
1.2MB
-
Sample
230305-n488csfg7s
-
MD5
c940a870cdbe9ae64510bf01abbfe29b
-
SHA1
0f88a7e7c80f94ebb68b71945ce5e029a753faf6
-
SHA256
01d4c768eb131e8f7e2ffef8bc17f9ceb629ffdb3dd4a6364aaf8096bdd16161
-
SHA512
38c401c005904c3a09f0be3b2119fab3076486a28cc2d6131b400ad28fc74bed9701c8597940edc8a2309d781e5225112d0eba43d69cf8add73468fd817a613a
-
SSDEEP
12288:KNzZZMOEAlI3MzSSV93CpeG4f3fjzwwup1qGlIp9AwPvv8FAl8rAnS904gk4x:qtmYdSSGaffjzwJp/Tis9rWxM4
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Targets
-
-
Target
tmp
-
Size
1.2MB
-
MD5
c940a870cdbe9ae64510bf01abbfe29b
-
SHA1
0f88a7e7c80f94ebb68b71945ce5e029a753faf6
-
SHA256
01d4c768eb131e8f7e2ffef8bc17f9ceb629ffdb3dd4a6364aaf8096bdd16161
-
SHA512
38c401c005904c3a09f0be3b2119fab3076486a28cc2d6131b400ad28fc74bed9701c8597940edc8a2309d781e5225112d0eba43d69cf8add73468fd817a613a
-
SSDEEP
12288:KNzZZMOEAlI3MzSSV93CpeG4f3fjzwwup1qGlIp9AwPvv8FAl8rAnS904gk4x:qtmYdSSGaffjzwJp/Tis9rWxM4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-