General
-
Target
0e3e3e0efeb0205d2b62abf3d.exe
-
Size
308KB
-
Sample
230628-rjbm5shg45
-
MD5
0e3e3e0efeb0205d2b62abf3db782ef6
-
SHA1
42dc080b640b25c9c636f99f4aa59581e3c1b164
-
SHA256
e614f0c45b47ae3861628f9b915e50d283c1d6ccca43ec906d7f5376ea024bca
-
SHA512
f327130b84032e7276f13328464264f4da8392346a552cdd5b8fac688d9a1b60f240a86676d443bc6a79fa341887b1789443e9c9be74000fa403fb7f61e42821
-
SSDEEP
6144:MfArwo8dTRKUVxxBi38ZQghaM7geoxG4GOM47YPRyds:M4rwo8HK+xi3wQq7SxG4/BYP
Static task
static1
Behavioral task
behavioral1
Sample
0e3e3e0efeb0205d2b62abf3d.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
0e3e3e0efeb0205d2b62abf3d.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
0e3e3e0efeb0205d2b62abf3d.exe
-
Size
308KB
-
MD5
0e3e3e0efeb0205d2b62abf3db782ef6
-
SHA1
42dc080b640b25c9c636f99f4aa59581e3c1b164
-
SHA256
e614f0c45b47ae3861628f9b915e50d283c1d6ccca43ec906d7f5376ea024bca
-
SHA512
f327130b84032e7276f13328464264f4da8392346a552cdd5b8fac688d9a1b60f240a86676d443bc6a79fa341887b1789443e9c9be74000fa403fb7f61e42821
-
SSDEEP
6144:MfArwo8dTRKUVxxBi38ZQghaM7geoxG4GOM47YPRyds:M4rwo8HK+xi3wQq7SxG4/BYP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-