General
-
Target
1b5fbb1cd25cd280d193cce8dedcc3a330477bfec4ffea0388c1ca84244ef2b9
-
Size
1.6MB
-
Sample
250112-bkpy6aykcz
-
MD5
79a33529267e287dda9ea67dcbc0565d
-
SHA1
44efa7da25f22dc3e199d640f9889e8e16272070
-
SHA256
1b5fbb1cd25cd280d193cce8dedcc3a330477bfec4ffea0388c1ca84244ef2b9
-
SHA512
6b7854b1b78ef3aac025b0a868b1050a7c4e5a8aa9aaf5047d416e78a9bee9d9938ec8e9eb3cee9c697323f4e558e963e0c8054e81f18396a477499b015f4a1f
-
SSDEEP
49152:SxCkJ/+iWEqlhoyRWopXvjLoyEkmZ9Y14:wbJ/+iWpToywXA
Static task
static1
Behavioral task
behavioral1
Sample
1b5fbb1cd25cd280d193cce8dedcc3a330477bfec4ffea0388c1ca84244ef2b9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1b5fbb1cd25cd280d193cce8dedcc3a330477bfec4ffea0388c1ca84244ef2b9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
1b5fbb1cd25cd280d193cce8dedcc3a330477bfec4ffea0388c1ca84244ef2b9
-
Size
1.6MB
-
MD5
79a33529267e287dda9ea67dcbc0565d
-
SHA1
44efa7da25f22dc3e199d640f9889e8e16272070
-
SHA256
1b5fbb1cd25cd280d193cce8dedcc3a330477bfec4ffea0388c1ca84244ef2b9
-
SHA512
6b7854b1b78ef3aac025b0a868b1050a7c4e5a8aa9aaf5047d416e78a9bee9d9938ec8e9eb3cee9c697323f4e558e963e0c8054e81f18396a477499b015f4a1f
-
SSDEEP
49152:SxCkJ/+iWEqlhoyRWopXvjLoyEkmZ9Y14:wbJ/+iWpToywXA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-