General
-
Target
6afb80ce0f8163b83cf83124fa71b192233af267bd7089cfa4a9a2ff47abd854
-
Size
1001KB
-
Sample
230329-kzml1shc2v
-
MD5
be58f2a6688c8c5e996f824e10864786
-
SHA1
60bdcc0e631e13da7cd580d8f8b619592b8fa148
-
SHA256
6afb80ce0f8163b83cf83124fa71b192233af267bd7089cfa4a9a2ff47abd854
-
SHA512
ea3241dfa423c2539ee9a767d2c7692487d38401c034d744ea60ba77d2308e3823069b022433846b09ce6798e49e7eb7259ad5d7894a248082cdf4090c3b9448
-
SSDEEP
24576:1L12zVZ97g/qyVPir6Bgg2ZvevwfEyWCv2FV:1LAR374smB/Kv2wf7OF
Static task
static1
Behavioral task
behavioral1
Sample
6afb80ce0f8163b83cf83124fa71b192233af267bd7089cfa4a9a2ff47abd854.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
6afb80ce0f8163b83cf83124fa71b192233af267bd7089cfa4a9a2ff47abd854
-
Size
1001KB
-
MD5
be58f2a6688c8c5e996f824e10864786
-
SHA1
60bdcc0e631e13da7cd580d8f8b619592b8fa148
-
SHA256
6afb80ce0f8163b83cf83124fa71b192233af267bd7089cfa4a9a2ff47abd854
-
SHA512
ea3241dfa423c2539ee9a767d2c7692487d38401c034d744ea60ba77d2308e3823069b022433846b09ce6798e49e7eb7259ad5d7894a248082cdf4090c3b9448
-
SSDEEP
24576:1L12zVZ97g/qyVPir6Bgg2ZvevwfEyWCv2FV:1LAR374smB/Kv2wf7OF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-