General
-
Target
cd60a81d712e4f278be1650bc5d8b5bb.exe
-
Size
696KB
-
Sample
230424-rykvcseb51
-
MD5
cd60a81d712e4f278be1650bc5d8b5bb
-
SHA1
f049a6b0c4ea73a0ff10aa8a2469b9782a0d51b8
-
SHA256
baecc5ff2030bae2c7bbefd317d15f0a0c9934e3366993f78f920918b6fa675b
-
SHA512
9994d21acd35417f1734f584566b984a8a41661d1eba2d71f8fc9eab5d7b93408473738214f07b1f0f9650a9e29424615dc76d9ca8ff5448aefca409809648bb
-
SSDEEP
12288:2gjjPkCS32h/800n4H6IHdVhyOdwO3IpKvOTSMz2AYZZ3WObvUEnzKIJTIFPSew5:2gjjPkCSGhE056ayCGLZbOmOwEnmSe
Static task
static1
Behavioral task
behavioral1
Sample
cd60a81d712e4f278be1650bc5d8b5bb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cd60a81d712e4f278be1650bc5d8b5bb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Targets
-
-
Target
cd60a81d712e4f278be1650bc5d8b5bb.exe
-
Size
696KB
-
MD5
cd60a81d712e4f278be1650bc5d8b5bb
-
SHA1
f049a6b0c4ea73a0ff10aa8a2469b9782a0d51b8
-
SHA256
baecc5ff2030bae2c7bbefd317d15f0a0c9934e3366993f78f920918b6fa675b
-
SHA512
9994d21acd35417f1734f584566b984a8a41661d1eba2d71f8fc9eab5d7b93408473738214f07b1f0f9650a9e29424615dc76d9ca8ff5448aefca409809648bb
-
SSDEEP
12288:2gjjPkCS32h/800n4H6IHdVhyOdwO3IpKvOTSMz2AYZZ3WObvUEnzKIJTIFPSew5:2gjjPkCSGhE056ayCGLZbOmOwEnmSe
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-