General
-
Target
94167c7ed417035468f22aeffc07431a.zip
-
Size
15KB
-
Sample
230504-ms56wsbg49
-
MD5
57a08fc5e9c4b57902fb805d9efbe254
-
SHA1
4e6952e87351379f7f9f7854d71cb371222e3fef
-
SHA256
1d8f53d9c947af2e65cc63fa48539c2917315016284d201519594cff72a8f438
-
SHA512
e4b2553841bd33faae1760525e6470fe98ee15c67764aff97c889d39cb504655a6a7a01755c08a440f40ba666c4101f06a46c8b91f4e57ccbc264df7956b3cf1
-
SSDEEP
384:n/mT8hUPCM2AfDNWS3xUr7DW7/uo9wd0K/amEWM+km+Em:/5eCM2bS3xW7R2WtTMHfp
Static task
static1
Behavioral task
behavioral1
Sample
94167c7ed417035468f22aeffc07431a.rtf
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
94167c7ed417035468f22aeffc07431a.rtf
Resource
win7-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
94167c7ed417035468f22aeffc07431a
-
Size
31KB
-
MD5
94167c7ed417035468f22aeffc07431a
-
SHA1
f0949fac7cfc6f1448f406f19cd8133a97ea7589
-
SHA256
42a82b5198d7fd5275b88d6f582d1d968b774e4a5c248bbd1d1432ec63260ed0
-
SHA512
9bcf2f08cf74f178946f375f82a16c37befea5f806829a81705bee5266b235c6df33ff0b1241d4573eef45ccbab2f1fc49c91161d88ec0a9f0d931f9d6c8fb39
-
SSDEEP
768:rFx0XaIsnPRIa4fwJMLccf1Sup3YY9sv2eHd/Nm:rf0Xvx3EMQiS4YY9svi
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-