General
-
Target
7427f80f48fdeb3ec3ed3cf6b692b1f27b3bbbc0f188c2fe269826348269cb04
-
Size
606KB
-
Sample
240514-b5v1xaeg69
-
MD5
8493b6907ea580c2afdfd73bf9c2c9be
-
SHA1
a007986e855af715a2f8dc00d1119b1e43e10d78
-
SHA256
7427f80f48fdeb3ec3ed3cf6b692b1f27b3bbbc0f188c2fe269826348269cb04
-
SHA512
da56601115481be4b0ebbbecdf1b213ec59c7f2f49bdc2c563e58467610c89e443fdb84e881d8dc38bcfba4ddc875c7ee98d4a0514c33620eb97a1a4235ed326
-
SSDEEP
12288:TkxwwjNsb3YUKhiy3RHUoy9BG7CcS4L60gg6y:TkxwwjNsULIy9EG7s4Tp6y
Static task
static1
Behavioral task
behavioral1
Sample
7427f80f48fdeb3ec3ed3cf6b692b1f27b3bbbc0f188c2fe269826348269cb04.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7427f80f48fdeb3ec3ed3cf6b692b1f27b3bbbc0f188c2fe269826348269cb04.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#
Targets
-
-
Target
7427f80f48fdeb3ec3ed3cf6b692b1f27b3bbbc0f188c2fe269826348269cb04
-
Size
606KB
-
MD5
8493b6907ea580c2afdfd73bf9c2c9be
-
SHA1
a007986e855af715a2f8dc00d1119b1e43e10d78
-
SHA256
7427f80f48fdeb3ec3ed3cf6b692b1f27b3bbbc0f188c2fe269826348269cb04
-
SHA512
da56601115481be4b0ebbbecdf1b213ec59c7f2f49bdc2c563e58467610c89e443fdb84e881d8dc38bcfba4ddc875c7ee98d4a0514c33620eb97a1a4235ed326
-
SSDEEP
12288:TkxwwjNsb3YUKhiy3RHUoy9BG7CcS4L60gg6y:TkxwwjNsULIy9EG7s4Tp6y
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-