General
-
Target
02a2a2779ecd2cd887b97930a56fa5c8977a0d8fec04d06bf3fb65acb418fe9f
-
Size
673KB
-
Sample
231002-tz2wdaed72
-
MD5
26ef5df5466f83b5db24a2a917a62257
-
SHA1
64da3842f3c467cfbb877deb6b4f5b820a761e63
-
SHA256
02a2a2779ecd2cd887b97930a56fa5c8977a0d8fec04d06bf3fb65acb418fe9f
-
SHA512
4eb04187b6d67769165b81043f8aa4b23c055cbb0bddcb9a255d5551d5840c91df169c9e91d273adc010f4e01699a2ff613af1b04f2371a3fabf9f5d86029df9
-
SSDEEP
12288:wpmNumB0appp6t7kiQ9xcBUYBZKB3mteAhaUKFcEyuRZh5u6eg7lZtyBp8WAp:oty3DMBUYBZKZmteAhaUwXRzdlKLq
Static task
static1
Behavioral task
behavioral1
Sample
02a2a2779ecd2cd887b97930a56fa5c8977a0d8fec04d06bf3fb65acb418fe9f.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
02a2a2779ecd2cd887b97930a56fa5c8977a0d8fec04d06bf3fb65acb418fe9f
-
Size
673KB
-
MD5
26ef5df5466f83b5db24a2a917a62257
-
SHA1
64da3842f3c467cfbb877deb6b4f5b820a761e63
-
SHA256
02a2a2779ecd2cd887b97930a56fa5c8977a0d8fec04d06bf3fb65acb418fe9f
-
SHA512
4eb04187b6d67769165b81043f8aa4b23c055cbb0bddcb9a255d5551d5840c91df169c9e91d273adc010f4e01699a2ff613af1b04f2371a3fabf9f5d86029df9
-
SSDEEP
12288:wpmNumB0appp6t7kiQ9xcBUYBZKB3mteAhaUKFcEyuRZh5u6eg7lZtyBp8WAp:oty3DMBUYBZKZmteAhaUwXRzdlKLq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-