General
-
Target
dc9c8a93ad12756aab236a00ef6ee30c1e17a7a1e85c586453c1745dd33d9106_JC.exe
-
Size
242KB
-
Sample
231013-clbnlacc45
-
MD5
74465b07b18cdbd8457f5f24b495ca16
-
SHA1
2181b33d710e8fc0882ae2ecacd01142b8d85664
-
SHA256
dc9c8a93ad12756aab236a00ef6ee30c1e17a7a1e85c586453c1745dd33d9106
-
SHA512
d091d92aa8b26a5a494372cf3df9947b8e688fbb1ea1e65828891851b4dd8ac3e18aa89da6a212757ce82290f5f1814ea8cc0b3978126484b004fe8929e2f6f8
-
SSDEEP
3072:TUctV8f+j9Mz9BH1K47BbJ0xrF4X7ckgWEE:QhfF71K47BbJGur/
Behavioral task
behavioral1
Sample
dc9c8a93ad12756aab236a00ef6ee30c1e17a7a1e85c586453c1745dd33d9106_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dc9c8a93ad12756aab236a00ef6ee30c1e17a7a1e85c586453c1745dd33d9106_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1151584869856587856/TSfqJPinoKJMQfdSxeC_i8_eyVJpSAyIfR01PmPrgyaBM0m4b-AMeuxrfwVpgEcqFcZx
Targets
-
-
Target
dc9c8a93ad12756aab236a00ef6ee30c1e17a7a1e85c586453c1745dd33d9106_JC.exe
-
Size
242KB
-
MD5
74465b07b18cdbd8457f5f24b495ca16
-
SHA1
2181b33d710e8fc0882ae2ecacd01142b8d85664
-
SHA256
dc9c8a93ad12756aab236a00ef6ee30c1e17a7a1e85c586453c1745dd33d9106
-
SHA512
d091d92aa8b26a5a494372cf3df9947b8e688fbb1ea1e65828891851b4dd8ac3e18aa89da6a212757ce82290f5f1814ea8cc0b3978126484b004fe8929e2f6f8
-
SSDEEP
3072:TUctV8f+j9Mz9BH1K47BbJ0xrF4X7ckgWEE:QhfF71K47BbJGur/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-