General
-
Target
9549d97eb752358d01342132fd4605531f199ba9a5e9e366dc6063d75ffba5a6_JC.exe
-
Size
1021KB
-
Sample
230923-xqnh6sbe98
-
MD5
b6d67fb82d931b66adf46c4283186677
-
SHA1
7d2c57618e544c0eb7fe8c3ec0236e2b355a0c2f
-
SHA256
9549d97eb752358d01342132fd4605531f199ba9a5e9e366dc6063d75ffba5a6
-
SHA512
072551d3378595ce6691ea4be52054ed3e283e6e58b477d5575e65c5785daa924848e2940d9cf457b0cef5afbdcc7006ceff16d426f4d3b511569e31e873e9b0
-
SSDEEP
12288:Qd+oUK2iNtj5ciCDC2ymkOQmqWfWc8qnudcFizc4YDAv9A+:7oUK1/eiWCBmkOUWdudcFiz0Av
Static task
static1
Behavioral task
behavioral1
Sample
9549d97eb752358d01342132fd4605531f199ba9a5e9e366dc6063d75ffba5a6_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9549d97eb752358d01342132fd4605531f199ba9a5e9e366dc6063d75ffba5a6_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1153220874120482837/adoq7rVcI9vsHGkLVr_4KMCfwaNS39vllRpkDHEZzdlyGpgQ0hnNrogHZlXm-U3xbQt1
Targets
-
-
Target
9549d97eb752358d01342132fd4605531f199ba9a5e9e366dc6063d75ffba5a6_JC.exe
-
Size
1021KB
-
MD5
b6d67fb82d931b66adf46c4283186677
-
SHA1
7d2c57618e544c0eb7fe8c3ec0236e2b355a0c2f
-
SHA256
9549d97eb752358d01342132fd4605531f199ba9a5e9e366dc6063d75ffba5a6
-
SHA512
072551d3378595ce6691ea4be52054ed3e283e6e58b477d5575e65c5785daa924848e2940d9cf457b0cef5afbdcc7006ceff16d426f4d3b511569e31e873e9b0
-
SSDEEP
12288:Qd+oUK2iNtj5ciCDC2ymkOQmqWfWc8qnudcFizc4YDAv9A+:7oUK1/eiWCBmkOUWdudcFiz0Av
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-