General

  • Target

    c66ed7ef679af7fc5265ec49fbd4905fddfe99ddd2475b03edcc8b09d142db33.exe

  • Size

    2.3MB

  • Sample

    240820-vvka7sxhnl

  • MD5

    5a678617379752131e70308ccbbb9fa4

  • SHA1

    639f67eab2cd9019e9fa75253f4feb8d067400fe

  • SHA256

    c66ed7ef679af7fc5265ec49fbd4905fddfe99ddd2475b03edcc8b09d142db33

  • SHA512

    1fa2d0bb240af457f2aba45b1c23af6d0a71683f0653b91ffdc01c7179a10a830b3b29602ad6f2d8ec330cc8b7adf70ffbe5e0f0b203aee19ced0863e182c59f

  • SSDEEP

    49152:fg7eO7kjTav5AwVZGxY3uS+s1vm1l4t+LKH8a5:s7lH5CK

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    cp8nl.hyperhost.ua
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    7213575aceACE@#$

Targets

    • Target

      c66ed7ef679af7fc5265ec49fbd4905fddfe99ddd2475b03edcc8b09d142db33.exe

    • Size

      2.3MB

    • MD5

      5a678617379752131e70308ccbbb9fa4

    • SHA1

      639f67eab2cd9019e9fa75253f4feb8d067400fe

    • SHA256

      c66ed7ef679af7fc5265ec49fbd4905fddfe99ddd2475b03edcc8b09d142db33

    • SHA512

      1fa2d0bb240af457f2aba45b1c23af6d0a71683f0653b91ffdc01c7179a10a830b3b29602ad6f2d8ec330cc8b7adf70ffbe5e0f0b203aee19ced0863e182c59f

    • SSDEEP

      49152:fg7eO7kjTav5AwVZGxY3uS+s1vm1l4t+LKH8a5:s7lH5CK

MITRE ATT&CK Enterprise v15

Tasks