General
-
Target
25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d_JC.exe
-
Size
315KB
-
Sample
231012-sjmwvahh25
-
MD5
5f7cb94f4ab08ee714d801d8cdb10342
-
SHA1
1eee64e698b780a13ab21d1dfb31a4dbeb43901b
-
SHA256
25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d
-
SHA512
9346aa9910d012d926a2c6e7622797e3e4e2c7479514c64db037a4aea777bfcdede3875be3b4024366e96f6f86140c6b5c29209d623ad1b3b93a2a221960eb55
-
SSDEEP
6144:rbJyFMhIorW0wFndl3Swqk6/d1FPCiDPXcEfiu+kPHZnT:rUF4I0w4wqk6/d1FPVP/6TkPZn
Static task
static1
Behavioral task
behavioral1
Sample
25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.felluceisi.com - Port:
587 - Username:
[email protected] - Password:
Ffkonya2018x - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.felluceisi.com - Port:
587 - Username:
[email protected] - Password:
Ffkonya2018x
Targets
-
-
Target
25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d_JC.exe
-
Size
315KB
-
MD5
5f7cb94f4ab08ee714d801d8cdb10342
-
SHA1
1eee64e698b780a13ab21d1dfb31a4dbeb43901b
-
SHA256
25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d
-
SHA512
9346aa9910d012d926a2c6e7622797e3e4e2c7479514c64db037a4aea777bfcdede3875be3b4024366e96f6f86140c6b5c29209d623ad1b3b93a2a221960eb55
-
SSDEEP
6144:rbJyFMhIorW0wFndl3Swqk6/d1FPCiDPXcEfiu+kPHZnT:rUF4I0w4wqk6/d1FPVP/6TkPZn
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-