General
-
Target
ef9997dc0f82da72b3224fb1e3859ec6.exe
-
Size
757KB
-
Sample
231107-hqcdksed66
-
MD5
ef9997dc0f82da72b3224fb1e3859ec6
-
SHA1
d52a6edaa52164d8e8b5d712fbf46729a9d57613
-
SHA256
d1164fe7652f2c5c800f0227383ebbd77157e84ff84d6713e4a8ea3ff7d47f86
-
SHA512
a0ba0026f20123ae8af803beab9da5fa46a886d3f07e6f74796c1587385993f509555ae451964494a035995528b7407e5c540ac03394e3499ac7a9b1dc2bf967
-
SSDEEP
12288:2pW5DIaIftlexM1+meMfmBr9J4Hlim12e3d1l99NHfQXDnzr1LVI5fd2BT:2k50a0T1+JMMxJ4HlHc+1l9zHfMVIDOT
Static task
static1
Behavioral task
behavioral1
Sample
ef9997dc0f82da72b3224fb1e3859ec6.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ef9997dc0f82da72b3224fb1e3859ec6.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@ - Email To:
[email protected]
Targets
-
-
Target
ef9997dc0f82da72b3224fb1e3859ec6.exe
-
Size
757KB
-
MD5
ef9997dc0f82da72b3224fb1e3859ec6
-
SHA1
d52a6edaa52164d8e8b5d712fbf46729a9d57613
-
SHA256
d1164fe7652f2c5c800f0227383ebbd77157e84ff84d6713e4a8ea3ff7d47f86
-
SHA512
a0ba0026f20123ae8af803beab9da5fa46a886d3f07e6f74796c1587385993f509555ae451964494a035995528b7407e5c540ac03394e3499ac7a9b1dc2bf967
-
SSDEEP
12288:2pW5DIaIftlexM1+meMfmBr9J4Hlim12e3d1l99NHfQXDnzr1LVI5fd2BT:2k50a0T1+JMMxJ4HlHc+1l9zHfMVIDOT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-