General
-
Target
30793337658213fa17e05ad4b3e766409b7fc7e36c5eea3da0459be7ba703b3e
-
Size
20KB
-
Sample
240426-bqgjzagh64
-
MD5
fa5fcb25b0a66ca07d9b960ea665609c
-
SHA1
fad91599a42b00ee269c8c39f1311f1163f523e9
-
SHA256
30793337658213fa17e05ad4b3e766409b7fc7e36c5eea3da0459be7ba703b3e
-
SHA512
8ec80e6686c27c238dd9b5b4a2f33c585349857ce82c6a0553264350ad982ba6f276e82251c5d986211319b5ed231701929a67d39f5fee09a96f351c534aec10
-
SSDEEP
384:S95MWCK6LPaPrEe/5cbrmUPNa26ForPkAHPLrJ6N8rmRh9chOJmwNHSBXWM64xTg:SyL/qONa26CPjvhBqD9cRWf41M+/xg
Static task
static1
Behavioral task
behavioral1
Sample
30793337658213fa17e05ad4b3e766409b7fc7e36c5eea3da0459be7ba703b3e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30793337658213fa17e05ad4b3e766409b7fc7e36c5eea3da0459be7ba703b3e.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.hypos-care.com - Port:
587 - Username:
breakingbadse@hypos-care.com - Password:
$zg$gUa2 - Email To:
breakingbadrc@hypos-care.com
Targets
-
-
Target
30793337658213fa17e05ad4b3e766409b7fc7e36c5eea3da0459be7ba703b3e
-
Size
20KB
-
MD5
fa5fcb25b0a66ca07d9b960ea665609c
-
SHA1
fad91599a42b00ee269c8c39f1311f1163f523e9
-
SHA256
30793337658213fa17e05ad4b3e766409b7fc7e36c5eea3da0459be7ba703b3e
-
SHA512
8ec80e6686c27c238dd9b5b4a2f33c585349857ce82c6a0553264350ad982ba6f276e82251c5d986211319b5ed231701929a67d39f5fee09a96f351c534aec10
-
SSDEEP
384:S95MWCK6LPaPrEe/5cbrmUPNa26ForPkAHPLrJ6N8rmRh9chOJmwNHSBXWM64xTg:SyL/qONa26CPjvhBqD9cRWf41M+/xg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-