General
-
Target
a3bf4067de0bab2eb1fbac9387dee051.exe
-
Size
551KB
-
Sample
230424-rykjlacd95
-
MD5
a3bf4067de0bab2eb1fbac9387dee051
-
SHA1
e64101fca02a7f17dcf949c8c8f1bd8e3b728146
-
SHA256
d3863329490232ec4baedef01a781ba4f7e5053c9fc0cf6a7b5a904447662888
-
SHA512
497cbdb7a6076e333882bf1a0bcb513d2b0a3851fe5198f7b1eb10b733d9703d22cdb7c435b9bf30b9bca8c70cc6bc52af1b5775eb9de8530b20b8203268cf63
-
SSDEEP
12288:LJRWzaxwecadQGGU3ydB/v2Ns0enoT7vJfcUvb:7WzO4UiSNVenkv
Static task
static1
Behavioral task
behavioral1
Sample
a3bf4067de0bab2eb1fbac9387dee051.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a3bf4067de0bab2eb1fbac9387dee051.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Targets
-
-
Target
a3bf4067de0bab2eb1fbac9387dee051.exe
-
Size
551KB
-
MD5
a3bf4067de0bab2eb1fbac9387dee051
-
SHA1
e64101fca02a7f17dcf949c8c8f1bd8e3b728146
-
SHA256
d3863329490232ec4baedef01a781ba4f7e5053c9fc0cf6a7b5a904447662888
-
SHA512
497cbdb7a6076e333882bf1a0bcb513d2b0a3851fe5198f7b1eb10b733d9703d22cdb7c435b9bf30b9bca8c70cc6bc52af1b5775eb9de8530b20b8203268cf63
-
SSDEEP
12288:LJRWzaxwecadQGGU3ydB/v2Ns0enoT7vJfcUvb:7WzO4UiSNVenkv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-