General
-
Target
132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea_JC.exe
-
Size
980KB
-
Sample
231012-pj49cahh8w
-
MD5
41fb928ba68387772e403c843854bcce
-
SHA1
d076e78785373e33b5476bdcc1a71beb10c7cbdd
-
SHA256
132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea
-
SHA512
43d05ec1488b3e6b37c782130b9612c9d5db7947e31acc8293badad38938030eb672ca2dc504432946f9d661a099fb02253dc6db7e1176754f22ffc6694eeed4
-
SSDEEP
12288:+AfDuHOXwd0wwSWbj3eIiL9mjcJURhdh8lUCCGWFWV42+juCpzU1tpRJKltk/Z:+gWSwBWbjuvmzRhMcNaD9x
Static task
static1
Behavioral task
behavioral1
Sample
132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1150868317029023815/cT6u46fA3REOAlZKgnGhenvlyBkS2aXAuSOeMy71MU-CPTLC2dPDTvQxc4lMobWH2PYW
Targets
-
-
Target
132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea_JC.exe
-
Size
980KB
-
MD5
41fb928ba68387772e403c843854bcce
-
SHA1
d076e78785373e33b5476bdcc1a71beb10c7cbdd
-
SHA256
132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea
-
SHA512
43d05ec1488b3e6b37c782130b9612c9d5db7947e31acc8293badad38938030eb672ca2dc504432946f9d661a099fb02253dc6db7e1176754f22ffc6694eeed4
-
SSDEEP
12288:+AfDuHOXwd0wwSWbj3eIiL9mjcJURhdh8lUCCGWFWV42+juCpzU1tpRJKltk/Z:+gWSwBWbjuvmzRhMcNaD9x
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-