General
-
Target
fd4974ab82ca37f9c285663a934fab7f515eaf97038fde673cab552d41f7466c
-
Size
888KB
-
Sample
231011-wt52ysea7w
-
MD5
9a4ed7e1fbe2cba76dea83ec830aa5ad
-
SHA1
5ab4c640e9f7743741031c47bb2a9e57f9c3234f
-
SHA256
fd4974ab82ca37f9c285663a934fab7f515eaf97038fde673cab552d41f7466c
-
SHA512
a3f0688250c10fc7aefa3cb03c9b171e917322c4ce2d82b62828b4f37137015aa885ddb87db23892dc5f82e4113bd8c6bf2ef9b23073adbb1960411bcff93024
-
SSDEEP
12288:d5X9K7DqxSmlBtAIr0hk4C4t5e56vwQ8T2aYfFpEQ:d5tUuIINrCgpQ023fFpEQ
Static task
static1
Behavioral task
behavioral1
Sample
fd4974ab82ca37f9c285663a934fab7f515eaf97038fde673cab552d41f7466c.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@ - Email To:
[email protected]
Targets
-
-
Target
fd4974ab82ca37f9c285663a934fab7f515eaf97038fde673cab552d41f7466c
-
Size
888KB
-
MD5
9a4ed7e1fbe2cba76dea83ec830aa5ad
-
SHA1
5ab4c640e9f7743741031c47bb2a9e57f9c3234f
-
SHA256
fd4974ab82ca37f9c285663a934fab7f515eaf97038fde673cab552d41f7466c
-
SHA512
a3f0688250c10fc7aefa3cb03c9b171e917322c4ce2d82b62828b4f37137015aa885ddb87db23892dc5f82e4113bd8c6bf2ef9b23073adbb1960411bcff93024
-
SSDEEP
12288:d5X9K7DqxSmlBtAIr0hk4C4t5e56vwQ8T2aYfFpEQ:d5tUuIINrCgpQ023fFpEQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-