General
-
Target
Zapytanie.60104.rar
-
Size
714KB
-
Sample
240725-pczqaaxgpn
-
MD5
d26ad0ca1659933116063c82b0ce64d0
-
SHA1
b002c0d5f3d48a59632d1e59b358d9f33e36b821
-
SHA256
b4403f9f2a5153d343cb6c41a07aa2a5e357b35ff05ca51871072abff04c142b
-
SHA512
65d46925788f93835e7a344e8258ca4f60002737271264485e8af05ef73b982f860160d3be8530578d480e2ca90d365adf1fcd8e9f6f6b585eca969cfd36689f
-
SSDEEP
12288:vFdbvf1hVE/L69TjjHsXF5Gt2SWBKZRGjDx6hk7ARuYS7vlUIrlvAKSSc/qE:vFdb3XVQ8TjLsTz0RGvxn0RuZJUiIP/7
Static task
static1
Behavioral task
behavioral1
Sample
Zapytanie.60104.scr
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Zapytanie.60104.scr
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#
Targets
-
-
Target
Zapytanie.60104.scr
-
Size
1.6MB
-
MD5
3f0358cdaf08eb927c3e95696ab2d5f9
-
SHA1
414d2aa75d30c99452e70844c2bc60104b8d2627
-
SHA256
6cedae485c55447b183ce31a3bb2b200190898e7a1df585fac1351bc96305005
-
SHA512
3a33b141d92fdcc92103b9699bd0e25793f64711364ad929cde9f794ea39081452047347564c1923fcec050e1568738f38120056d087d7e5950379fe30a21fac
-
SSDEEP
24576:4xMC9km6k/IwRYbiBeKGCdiwtfHl41jHnhweNi4l/:5C9sk/IRUnM2vlI9vNi4l
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext
-