General
-
Target
Certificates Of Analaysis.rar
-
Size
900KB
-
Sample
230607-pl66qaad27
-
MD5
e8c5a7c720c402e09c6fef9743d34819
-
SHA1
8078a4fdd82f4c060354a12e1482a0db30c5b79c
-
SHA256
78a7bc3695f30a244507c25f77b3a7cd9483f89545bdeafcae57856280a1f5f4
-
SHA512
6842c06c343d69187c1ea83c70f460d0d70935e5b718ebfb116129d34b46690472d30eba21ba83abe5a4ce29704c8f757df8d3f0b738eb131b474ea0df1faa56
-
SSDEEP
24576:XZeitH3gR//DwWmnxfgox8Kjhsdqz2Q/QuYxcD5H/i:JbtHSmgO8K9p2Q/8wfi
Static task
static1
Behavioral task
behavioral1
Sample
QiHu2b7HMHafiPp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
QiHu2b7HMHafiPp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
QiHu2b7HMHafiPp.exe
-
Size
1020KB
-
MD5
15ff9955368f9c4b2e5042bcccf84331
-
SHA1
42243d2d6cf54f11021262cf46346088d33e602b
-
SHA256
61c75c0d5321db299e58bf919860e9afa4471e4e97dddd00fad6a761cdd0a61e
-
SHA512
4ef8c0c79aa843a5d3c0f2acc34c1f6686ac68e8105134d5d354362cd7db55908a9ce1814e913001d17044689e16e39e91ff3e6f0abe12c10c0a3a0c30d0701b
-
SSDEEP
24576:ryr5/47m5E+8sFDi0HSLwQ12g0Wli4xj:ryr5/4sFjSR2g0WM4xj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-