General
-
Target
5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe_JC.exe
-
Size
532KB
-
Sample
230919-td51xaab6s
-
MD5
7857e7b77ecab84c04dcf49b81e1d095
-
SHA1
84fd004c945759e63f077cb8d21d2c64c15aa40c
-
SHA256
5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe
-
SHA512
81ea194b063a637a16602a740a4e7a70ca295ddac04dcde0cfb3c2e1e7070c1f9696053350778936c15174697f8cd37d4e4d1211a398c4958d33b0be276c3d3b
-
SSDEEP
6144:MFVbJMcvmZzlUjmcncJVoPgb7UG3XpOHh88AqZagXpJ8QLs1cknClGi2oke3U3tg:MjISkH3M88AqZa+/fkClGi2P3XhRlG
Static task
static1
Behavioral task
behavioral1
Sample
5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.wecaresvc.com - Port:
587 - Username:
[email protected] - Password:
u9367gk8qc - Email To:
[email protected]
Targets
-
-
Target
5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe_JC.exe
-
Size
532KB
-
MD5
7857e7b77ecab84c04dcf49b81e1d095
-
SHA1
84fd004c945759e63f077cb8d21d2c64c15aa40c
-
SHA256
5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe
-
SHA512
81ea194b063a637a16602a740a4e7a70ca295ddac04dcde0cfb3c2e1e7070c1f9696053350778936c15174697f8cd37d4e4d1211a398c4958d33b0be276c3d3b
-
SSDEEP
6144:MFVbJMcvmZzlUjmcncJVoPgb7UG3XpOHh88AqZagXpJ8QLs1cknClGi2oke3U3tg:MjISkH3M88AqZa+/fkClGi2P3XhRlG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-