General
-
Target
198a27bb3eafb16e85363be12dc849311bc4e25043794c5ee1364f2422dbdf4dexe_JC.exe
-
Size
699KB
-
Sample
230801-rpjkyagc54
-
MD5
9a3cb6c4e08b0a2fc307a5eec8a3a686
-
SHA1
bdfcb97ebec40154f9cb348127099c964b41f098
-
SHA256
198a27bb3eafb16e85363be12dc849311bc4e25043794c5ee1364f2422dbdf4d
-
SHA512
7fa78e212d40fe314d33e6ef43a048ab26a1286e6250ccd675cb2ecbfb2de9b81b869dd5de17ee5118d7d2f948d53b3ebce8a81bd52070ca47b2b9259e52b3c9
-
SSDEEP
12288:t+uZFr8YmJ+37MZaFOgf+OQSIYOcvg4uKfeN6XTHLt/WnkVYEUm972OQ:t+uX8YmQ37MZaOO3ycv1uKjXPtwkam9e
Static task
static1
Behavioral task
behavioral1
Sample
198a27bb3eafb16e85363be12dc849311bc4e25043794c5ee1364f2422dbdf4dexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
198a27bb3eafb16e85363be12dc849311bc4e25043794c5ee1364f2422dbdf4dexe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.obynnehhhan.com - Port:
587 - Username:
[email protected] - Password:
G$MUuYG3
Targets
-
-
Target
198a27bb3eafb16e85363be12dc849311bc4e25043794c5ee1364f2422dbdf4dexe_JC.exe
-
Size
699KB
-
MD5
9a3cb6c4e08b0a2fc307a5eec8a3a686
-
SHA1
bdfcb97ebec40154f9cb348127099c964b41f098
-
SHA256
198a27bb3eafb16e85363be12dc849311bc4e25043794c5ee1364f2422dbdf4d
-
SHA512
7fa78e212d40fe314d33e6ef43a048ab26a1286e6250ccd675cb2ecbfb2de9b81b869dd5de17ee5118d7d2f948d53b3ebce8a81bd52070ca47b2b9259e52b3c9
-
SSDEEP
12288:t+uZFr8YmJ+37MZaFOgf+OQSIYOcvg4uKfeN6XTHLt/WnkVYEUm972OQ:t+uX8YmQ37MZaOO3ycv1uKjXPtwkam9e
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-