General
-
Target
MBD573792309CGO7238929273XDG02823929.exe
-
Size
1.2MB
-
Sample
241002-k2k6zaxhnr
-
MD5
2770496d0afd0540ea49b86e16f997a7
-
SHA1
487772c023f656e3c4560f00f06ed8314760f092
-
SHA256
ab1a43c5eb5c82a3199a543deb4e3289c9fa0a2439e2f962c6774772227e5cdf
-
SHA512
5c3e541440c12ec1bc9c93ae6316b673d45821f3de4b25672baafb337c84697261ad5a1e656016e726805dddc0cfd439ae674bcaaf64ebf1f6abfb183c2a5596
-
SSDEEP
24576:gfmMv6Ckr7Mny5Q4uY671wUAHO+W7D5trQqPRJp:g3v+7/5Q4ur1d7r5Tp
Static task
static1
Behavioral task
behavioral1
Sample
MBD573792309CGO7238929273XDG02823929.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
tank576$%)&** - Email To:
[email protected]
Targets
-
-
Target
MBD573792309CGO7238929273XDG02823929.exe
-
Size
1.2MB
-
MD5
2770496d0afd0540ea49b86e16f997a7
-
SHA1
487772c023f656e3c4560f00f06ed8314760f092
-
SHA256
ab1a43c5eb5c82a3199a543deb4e3289c9fa0a2439e2f962c6774772227e5cdf
-
SHA512
5c3e541440c12ec1bc9c93ae6316b673d45821f3de4b25672baafb337c84697261ad5a1e656016e726805dddc0cfd439ae674bcaaf64ebf1f6abfb183c2a5596
-
SSDEEP
24576:gfmMv6Ckr7Mny5Q4uY671wUAHO+W7D5trQqPRJp:g3v+7/5Q4ur1d7r5Tp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-