General
-
Target
7d0def77a0bec3d3c3b7aab43cece6a43f4eeccb8295e0bb1f1cea1cc8863a23
-
Size
597KB
-
Sample
231120-nsnghsgf4y
-
MD5
66dcf542108063008a9795469775c906
-
SHA1
ecb486b2fd6cff5f9d4888de73bd962878e343a2
-
SHA256
7d0def77a0bec3d3c3b7aab43cece6a43f4eeccb8295e0bb1f1cea1cc8863a23
-
SHA512
14058500816a16511008b92c55a8be1d4984035840dbde50dce1a7a1a6a5c9166f7371296a7cf227183ae7795a756ab7893e75d604ecccdb62af280006b1b5ef
-
SSDEEP
12288:qEX0COPSTivCenShfRTMBuYBqyJ00TD/F4PAuIOpne3tWkq42XjbNnrfz:ySTiqewTmu1y3D/F4ikOokxEbNnrf
Static task
static1
Behavioral task
behavioral1
Sample
7d0def77a0bec3d3c3b7aab43cece6a43f4eeccb8295e0bb1f1cea1cc8863a23.exe
Resource
win10-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@ - Email To:
[email protected]
Targets
-
-
Target
7d0def77a0bec3d3c3b7aab43cece6a43f4eeccb8295e0bb1f1cea1cc8863a23
-
Size
597KB
-
MD5
66dcf542108063008a9795469775c906
-
SHA1
ecb486b2fd6cff5f9d4888de73bd962878e343a2
-
SHA256
7d0def77a0bec3d3c3b7aab43cece6a43f4eeccb8295e0bb1f1cea1cc8863a23
-
SHA512
14058500816a16511008b92c55a8be1d4984035840dbde50dce1a7a1a6a5c9166f7371296a7cf227183ae7795a756ab7893e75d604ecccdb62af280006b1b5ef
-
SSDEEP
12288:qEX0COPSTivCenShfRTMBuYBqyJ00TD/F4PAuIOpne3tWkq42XjbNnrfz:ySTiqewTmu1y3D/F4ikOokxEbNnrf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-