General
-
Target
03809df7dfacfd37c43744229fa815647220c01f3cef74206454bad065c2ec55
-
Size
1.1MB
-
Sample
241120-bsh6ksxckh
-
MD5
26e8f1d34499f455df8ff9e71d834afe
-
SHA1
d519c8b2fc96e7d1c2463b7ba2e801da5d886d25
-
SHA256
03809df7dfacfd37c43744229fa815647220c01f3cef74206454bad065c2ec55
-
SHA512
dcf32ea6a8aa0b5875793c76e5d22c28f268f17fc2db5253b2eba2fbbf22ba165ec30788873896ba5fa6891f44ae6f0dc7cfb43b6cd93659bca905eb941fd59b
-
SSDEEP
24576:Btb20pkaCqT5TBWgNQ7a+cqpsR65qWj6A:SVg5tQ7a+cquw5d5
Static task
static1
Behavioral task
behavioral1
Sample
03809df7dfacfd37c43744229fa815647220c01f3cef74206454bad065c2ec55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03809df7dfacfd37c43744229fa815647220c01f3cef74206454bad065c2ec55.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
cy+G_(979n9N
Targets
-
-
Target
03809df7dfacfd37c43744229fa815647220c01f3cef74206454bad065c2ec55
-
Size
1.1MB
-
MD5
26e8f1d34499f455df8ff9e71d834afe
-
SHA1
d519c8b2fc96e7d1c2463b7ba2e801da5d886d25
-
SHA256
03809df7dfacfd37c43744229fa815647220c01f3cef74206454bad065c2ec55
-
SHA512
dcf32ea6a8aa0b5875793c76e5d22c28f268f17fc2db5253b2eba2fbbf22ba165ec30788873896ba5fa6891f44ae6f0dc7cfb43b6cd93659bca905eb941fd59b
-
SSDEEP
24576:Btb20pkaCqT5TBWgNQ7a+cqpsR65qWj6A:SVg5tQ7a+cquw5d5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1