General
-
Target
c0d69c07096000d15184964499d68e91874da06fc8d461ae8b4bc376ea72fd30
-
Size
1007KB
-
Sample
230307-nyh4zshg79
-
MD5
7922e40015f186d02baa152911f268dc
-
SHA1
eb445943e5cfebc37e5eded2e87bc3bf16662bb0
-
SHA256
c0d69c07096000d15184964499d68e91874da06fc8d461ae8b4bc376ea72fd30
-
SHA512
c0cb01ed9b24d0c677df13b23807108e913d6f898227d79071381ca1a89e495d1945611d84e5d67c594bb272cbb4c4bc98161a49b7d921db3f19c8417d44b5d2
-
SSDEEP
24576:PTYNUbH5MuG6CT9JSiKuyyBgAFJY9cqBp:UNuZo6YjSduyyBgAFJYv
Static task
static1
Behavioral task
behavioral1
Sample
c0d69c07096000d15184964499d68e91874da06fc8d461ae8b4bc376ea72fd30.exe
Resource
win10-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
c0d69c07096000d15184964499d68e91874da06fc8d461ae8b4bc376ea72fd30
-
Size
1007KB
-
MD5
7922e40015f186d02baa152911f268dc
-
SHA1
eb445943e5cfebc37e5eded2e87bc3bf16662bb0
-
SHA256
c0d69c07096000d15184964499d68e91874da06fc8d461ae8b4bc376ea72fd30
-
SHA512
c0cb01ed9b24d0c677df13b23807108e913d6f898227d79071381ca1a89e495d1945611d84e5d67c594bb272cbb4c4bc98161a49b7d921db3f19c8417d44b5d2
-
SSDEEP
24576:PTYNUbH5MuG6CT9JSiKuyyBgAFJY9cqBp:UNuZo6YjSduyyBgAFJYv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-