General
-
Target
9bf932c615606080571b3cc725439bcb7409af88df7d31720c39a81b4a96f51d_JC.exe
-
Size
511KB
-
Sample
231011-2fbtvaaf99
-
MD5
4acdd97f89db87e3d64a46ffee69717c
-
SHA1
d2fec96daa1bc4fc66742dfb13c0db1f516da5be
-
SHA256
9bf932c615606080571b3cc725439bcb7409af88df7d31720c39a81b4a96f51d
-
SHA512
18be51189ae70c6e469cfd1f3b7b6c277a88412dfc100a6f8c9d4080831c85686531a1548ac50463c636df2191023afea0296ee1c9d19e34123adb7ef092f5f8
-
SSDEEP
12288:pYYaDT2T2u42va9wOKN6QyZzBou1g+VIe9T204n:pY1yT2Z2kvQ6BomVrEN
Static task
static1
Behavioral task
behavioral1
Sample
9bf932c615606080571b3cc725439bcb7409af88df7d31720c39a81b4a96f51d_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9bf932c615606080571b3cc725439bcb7409af88df7d31720c39a81b4a96f51d_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
9bf932c615606080571b3cc725439bcb7409af88df7d31720c39a81b4a96f51d_JC.exe
-
Size
511KB
-
MD5
4acdd97f89db87e3d64a46ffee69717c
-
SHA1
d2fec96daa1bc4fc66742dfb13c0db1f516da5be
-
SHA256
9bf932c615606080571b3cc725439bcb7409af88df7d31720c39a81b4a96f51d
-
SHA512
18be51189ae70c6e469cfd1f3b7b6c277a88412dfc100a6f8c9d4080831c85686531a1548ac50463c636df2191023afea0296ee1c9d19e34123adb7ef092f5f8
-
SSDEEP
12288:pYYaDT2T2u42va9wOKN6QyZzBou1g+VIe9T204n:pY1yT2Z2kvQ6BomVrEN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-