General
-
Target
b04f7ff1cfec978b59c749c0d4a9256d676aefc546c6141f3ddad13fc32d088e.exe
-
Size
1.1MB
-
Sample
240813-vvgkbawepg
-
MD5
198422fbae29b65c629b01d48190ae58
-
SHA1
2bfb45ec29f4b01d64330f4ea692887ba70ee3ec
-
SHA256
b04f7ff1cfec978b59c749c0d4a9256d676aefc546c6141f3ddad13fc32d088e
-
SHA512
c37990edff2566c5e91494d72374a064fe44d9237ea4e9ca140e779865f7a62560bad8af3bfc2066e7370f462c64e8419cc26381454708adacd1a96ebaf0e479
-
SSDEEP
24576:AAHnh+eWsN3skA4RV1Hom2KXMmHaJIGZoIUGHM5:3h+ZkldoPK8YaJI5IUGS
Static task
static1
Behavioral task
behavioral1
Sample
b04f7ff1cfec978b59c749c0d4a9256d676aefc546c6141f3ddad13fc32d088e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b04f7ff1cfec978b59c749c0d4a9256d676aefc546c6141f3ddad13fc32d088e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
@qwerty90123 - Email To:
[email protected]
Targets
-
-
Target
b04f7ff1cfec978b59c749c0d4a9256d676aefc546c6141f3ddad13fc32d088e.exe
-
Size
1.1MB
-
MD5
198422fbae29b65c629b01d48190ae58
-
SHA1
2bfb45ec29f4b01d64330f4ea692887ba70ee3ec
-
SHA256
b04f7ff1cfec978b59c749c0d4a9256d676aefc546c6141f3ddad13fc32d088e
-
SHA512
c37990edff2566c5e91494d72374a064fe44d9237ea4e9ca140e779865f7a62560bad8af3bfc2066e7370f462c64e8419cc26381454708adacd1a96ebaf0e479
-
SSDEEP
24576:AAHnh+eWsN3skA4RV1Hom2KXMmHaJIGZoIUGHM5:3h+ZkldoPK8YaJI5IUGS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext
-