General
-
Target
f74b812551e86b72772d6cf756540651.exe
-
Size
694KB
-
Sample
231204-lgghqaac6y
-
MD5
f74b812551e86b72772d6cf756540651
-
SHA1
7f0d403e730da4b523b7196e6069628d0d5ca69c
-
SHA256
90692f33abb1c304523cbd1ef8faf16d31a9ba0ef1a99b00aaa267ea14b2fecc
-
SHA512
2f36a30d847078236505250bcbdf5c4f7be6381ba86804a18e73cbb040438f8836a7af154729e6b9828e33f0511a0d17681d3728554eb5fe31dfad16a8a760d8
-
SSDEEP
12288:q2iNtI95D9GFQf+mgnwmiErxOH6Tva8oHHrDY:q1G5ReGNgLz4sForc
Static task
static1
Behavioral task
behavioral1
Sample
f74b812551e86b72772d6cf756540651.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
f74b812551e86b72772d6cf756540651.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
f74b812551e86b72772d6cf756540651.exe
-
Size
694KB
-
MD5
f74b812551e86b72772d6cf756540651
-
SHA1
7f0d403e730da4b523b7196e6069628d0d5ca69c
-
SHA256
90692f33abb1c304523cbd1ef8faf16d31a9ba0ef1a99b00aaa267ea14b2fecc
-
SHA512
2f36a30d847078236505250bcbdf5c4f7be6381ba86804a18e73cbb040438f8836a7af154729e6b9828e33f0511a0d17681d3728554eb5fe31dfad16a8a760d8
-
SSDEEP
12288:q2iNtI95D9GFQf+mgnwmiErxOH6Tva8oHHrDY:q1G5ReGNgLz4sForc
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-