General
-
Target
a5e5a2eac636035a32e7e8750105955f0795e36715a1a46e0becba3f4a8a3672
-
Size
620KB
-
Sample
231212-f1vlssfedp
-
MD5
575968a1f7c8198c725b0fb39ecf7b48
-
SHA1
c3f184b71474527f32e2bfacfce79c36f39f8ea7
-
SHA256
a5e5a2eac636035a32e7e8750105955f0795e36715a1a46e0becba3f4a8a3672
-
SHA512
9948f297f3d42d8654b915c124e87ede93d79a1962578a42e40bf33a497b012aeb01164ac1ee1f10b5ab305ece4975d7500647b41239040cfa41cc122307e643
-
SSDEEP
12288:Eg3IU8S6eUdzTUxbq0YOaoxqLsH/EkXVt0KLsjd/9EVqEopHT+Hc0B2/:EeItSAdzAxNYOabLsH/EkXV+9x+qEsee
Static task
static1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@ - Email To:
[email protected]
Targets
-
-
Target
a5e5a2eac636035a32e7e8750105955f0795e36715a1a46e0becba3f4a8a3672
-
Size
620KB
-
MD5
575968a1f7c8198c725b0fb39ecf7b48
-
SHA1
c3f184b71474527f32e2bfacfce79c36f39f8ea7
-
SHA256
a5e5a2eac636035a32e7e8750105955f0795e36715a1a46e0becba3f4a8a3672
-
SHA512
9948f297f3d42d8654b915c124e87ede93d79a1962578a42e40bf33a497b012aeb01164ac1ee1f10b5ab305ece4975d7500647b41239040cfa41cc122307e643
-
SSDEEP
12288:Eg3IU8S6eUdzTUxbq0YOaoxqLsH/EkXVt0KLsjd/9EVqEopHT+Hc0B2/:EeItSAdzAxNYOabLsH/EkXV+9x+qEsee
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-