General
-
Target
aecd152282def027bfd51b70b018af2c80dabf50c52ba4100c71c1047fe027dd
-
Size
853KB
-
Sample
221204-tlll8sdh85
-
MD5
eb8d5d4beb9857ebd4a263bddb055f8f
-
SHA1
d83417253e03fdc19479f95977f1fe66346729ff
-
SHA256
aecd152282def027bfd51b70b018af2c80dabf50c52ba4100c71c1047fe027dd
-
SHA512
acb015bbc4e24bcf298de1ebdbe280abb82d1ba7262e9dcf6a510feebbd4b35c61a5869fbe33419591ed595f1a727f36d75366e3977bf80fb47df660c3af99bb
-
SSDEEP
24576:ufJP8wnqWRaJr8Fs+AFIU6I+rdux0PRatqsc+gs80sgmFwkI8Fr:2+BJr82FI3jpuapaNczEsgmFIYr
Static task
static1
Behavioral task
behavioral1
Sample
JTC20-PO074.075.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
JTC20-PO074.075.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.kpce-co.com - Port:
587 - Username:
[email protected] - Password:
l9#Qg$:nwmC3
Targets
-
-
Target
JTC20-PO074.075.exe
-
Size
1.2MB
-
MD5
5ca041632c9d92d36de6bbf016307719
-
SHA1
e4fb1871b21fdfa9beab676cd58a70f551930f7e
-
SHA256
164194c08dd53211cac7f964486f2dfbd9c1c8b4ccf980288d043f3544c7637e
-
SHA512
cadff82f9bdd33e721ac58172225c90d9d9d3dea50183e618d13286a0167ca3a8460f9a332fd73acd9051fa4d3750537fe4e7d70758094219e96695addac86e2
-
SSDEEP
24576:gQAnPK73wqJrGFem41Ic60+rVIx0JFCt8sc+WsU+sgGV+kICJrRy:ZwqJrGY1Ifv5IazCncVosgGVmId
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-