General
-
Target
eab04ba8851e5ff9a16555aa714be99c.bin
-
Size
653KB
-
Sample
240609-f9j7esec6v
-
MD5
b9544a569b457072f029c24ac86189d4
-
SHA1
feda8ae095af8813825093d7a7cca264b86b66ec
-
SHA256
66089e517f4c85bce60770b173ddff176d348910ac132015c2c93e09e2c17ff2
-
SHA512
9aec4339d731db92146266f12784f5da2491053b0334771e446d65db044e5b4db7b1451377fc101f6dabd4d4cbd795470b15231c3a591ed7462441c0550aea7a
-
SSDEEP
12288:3yHYWXCSr2UQ0SOg6xhbcdmT8jfDmlq07UmYARaQIRO7xsB2UpXtWr1:kYSCSr2UQ0SAtqrDmkonRaQiO7xjUpX+
Static task
static1
Behavioral task
behavioral1
Sample
c0cb57fc9baa9ee1d50147c106a363d2c6533f39f3cc4d509294b1faeef9eac6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0cb57fc9baa9ee1d50147c106a363d2c6533f39f3cc4d509294b1faeef9eac6.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
@qwerty90123 - Email To:
[email protected]
Targets
-
-
Target
c0cb57fc9baa9ee1d50147c106a363d2c6533f39f3cc4d509294b1faeef9eac6.exe
-
Size
1.1MB
-
MD5
eab04ba8851e5ff9a16555aa714be99c
-
SHA1
d8bd9ac62747f146088d69cc4f97385535c78241
-
SHA256
c0cb57fc9baa9ee1d50147c106a363d2c6533f39f3cc4d509294b1faeef9eac6
-
SHA512
79a19e05c33eb5fd817f1151d673278b8a1c0fdca6e3d1fbb8684224608690141c436fd63e30b0e89504224ef484909369859a5af436b47c775d85e5532c618c
-
SSDEEP
24576:XAHnh+eWsN3skA4RV1Hom2KXMmHaJqL08fAAW5:Kh+ZkldoPK8YaJqLJfAR
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-