General
-
Target
a169b28aef17ec40410b335f295192681dc0eaaaa1b9f870f87efb009a83447f
-
Size
821KB
-
Sample
230321-n3s5raab46
-
MD5
e749459aba6384348147825deed0a033
-
SHA1
3f79e748a302623218deed97c65770f2a851b2c0
-
SHA256
a169b28aef17ec40410b335f295192681dc0eaaaa1b9f870f87efb009a83447f
-
SHA512
e4c13a23b6262be43694b6424cea93f7051e4d53ab7aa20e21b95da0841f32708e7c66a37ec96451e23db6abedca1d35a62e217ae0218cac2f2dd6ae06f6412b
-
SSDEEP
12288:MhcsqYhckZ+7r9Dz/SxCfhf5GK0gDYGk5/SChIW+Try2lotjU2z6Hk:ojWNzR10W8SChI3eRG9H
Static task
static1
Behavioral task
behavioral1
Sample
a169b28aef17ec40410b335f295192681dc0eaaaa1b9f870f87efb009a83447f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
a169b28aef17ec40410b335f295192681dc0eaaaa1b9f870f87efb009a83447f
-
Size
821KB
-
MD5
e749459aba6384348147825deed0a033
-
SHA1
3f79e748a302623218deed97c65770f2a851b2c0
-
SHA256
a169b28aef17ec40410b335f295192681dc0eaaaa1b9f870f87efb009a83447f
-
SHA512
e4c13a23b6262be43694b6424cea93f7051e4d53ab7aa20e21b95da0841f32708e7c66a37ec96451e23db6abedca1d35a62e217ae0218cac2f2dd6ae06f6412b
-
SSDEEP
12288:MhcsqYhckZ+7r9Dz/SxCfhf5GK0gDYGk5/SChIW+Try2lotjU2z6Hk:ojWNzR10W8SChI3eRG9H
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-