General
-
Target
016bbb3f7e72cb4d011c3bed3.exe
-
Size
595KB
-
Sample
230709-tbsykaea33
-
MD5
016bbb3f7e72cb4d011c3bed3b0470e8
-
SHA1
39fc60a0940e8be6cf9fd2f43aab62175f8d6d4c
-
SHA256
eed91785114f1809e10662f0d0e7a95c0d577758fa263fd441bb29e361d1e4fd
-
SHA512
d34a5981d461650fe5cb2ad756262e0d22fe61e15db2a85c364f200e7863c824c7bfedfbb9b8f1017de5433481261671e096c04e15275c46f8528ce934773794
-
SSDEEP
12288:UCKPaI5amnYra9pVYAqfJyridezVt35mdJPIiQBoB:UxfAra9pVyyrN4/PIif
Static task
static1
Behavioral task
behavioral1
Sample
016bbb3f7e72cb4d011c3bed3.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
016bbb3f7e72cb4d011c3bed3.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: smtp- Host:
cp7nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp7nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
016bbb3f7e72cb4d011c3bed3.exe
-
Size
595KB
-
MD5
016bbb3f7e72cb4d011c3bed3b0470e8
-
SHA1
39fc60a0940e8be6cf9fd2f43aab62175f8d6d4c
-
SHA256
eed91785114f1809e10662f0d0e7a95c0d577758fa263fd441bb29e361d1e4fd
-
SHA512
d34a5981d461650fe5cb2ad756262e0d22fe61e15db2a85c364f200e7863c824c7bfedfbb9b8f1017de5433481261671e096c04e15275c46f8528ce934773794
-
SSDEEP
12288:UCKPaI5amnYra9pVYAqfJyridezVt35mdJPIiQBoB:UxfAra9pVyyrN4/PIif
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-