General
-
Target
a03f61df8c3751262c68a16b3b7a39d2523bd78b7c719c31de119c134a341575
-
Size
742KB
-
Sample
231011-kqrvdaec52
-
MD5
cc0b855dad36523135d5502337ea7b50
-
SHA1
19395299cfba721e0e842ff0acf3bc7603cc2379
-
SHA256
a03f61df8c3751262c68a16b3b7a39d2523bd78b7c719c31de119c134a341575
-
SHA512
2335347094ed5c3d56be5af51d2e1664a531891aa03a1d2a83385d10196187dc7e37780479aeb80e11dbb1b1826270bbd0b452b8f39cd9834761e3dd6ee75ac2
-
SSDEEP
12288:JtdL6yiRJU/WczRci4KoXPF574HziR5CLSTMnKG21hGZ7bot0dFSib:XJBFe+34KSPcY0GTwKG21gA6fSi
Static task
static1
Behavioral task
behavioral1
Sample
a03f61df8c3751262c68a16b3b7a39d2523bd78b7c719c31de119c134a341575.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a03f61df8c3751262c68a16b3b7a39d2523bd78b7c719c31de119c134a341575.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
a03f61df8c3751262c68a16b3b7a39d2523bd78b7c719c31de119c134a341575
-
Size
742KB
-
MD5
cc0b855dad36523135d5502337ea7b50
-
SHA1
19395299cfba721e0e842ff0acf3bc7603cc2379
-
SHA256
a03f61df8c3751262c68a16b3b7a39d2523bd78b7c719c31de119c134a341575
-
SHA512
2335347094ed5c3d56be5af51d2e1664a531891aa03a1d2a83385d10196187dc7e37780479aeb80e11dbb1b1826270bbd0b452b8f39cd9834761e3dd6ee75ac2
-
SSDEEP
12288:JtdL6yiRJU/WczRci4KoXPF574HziR5CLSTMnKG21hGZ7bot0dFSib:XJBFe+34KSPcY0GTwKG21gA6fSi
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-