General
-
Target
129467623307928e4bd892bf6320cd2f4c791e5d91d374036469ed09127dba45_JC.exe
-
Size
529KB
-
Sample
231013-devcssdd82
-
MD5
b788d2065eba417e7b2f8e189cf1ef4b
-
SHA1
3f984e916dcca1f164db9ed7fcd865fe3d264f3b
-
SHA256
129467623307928e4bd892bf6320cd2f4c791e5d91d374036469ed09127dba45
-
SHA512
b9e00ef859dd5d7fbad734cafcd1e1e4e4eb9c0b73d28521454ce5d3eb5a0703628c840fd6521036a95e292d45ff05b74437b58f1fa0bd60f4173999f5902ca1
-
SSDEEP
12288:mvHj8FwLm/HSfs/8FL3H2NrabonYpOmXLBjpx3NDauDS:mPj8F6uSU8FL3btOm7Bjz
Static task
static1
Behavioral task
behavioral1
Sample
129467623307928e4bd892bf6320cd2f4c791e5d91d374036469ed09127dba45_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
129467623307928e4bd892bf6320cd2f4c791e5d91d374036469ed09127dba45_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
129467623307928e4bd892bf6320cd2f4c791e5d91d374036469ed09127dba45_JC.exe
-
Size
529KB
-
MD5
b788d2065eba417e7b2f8e189cf1ef4b
-
SHA1
3f984e916dcca1f164db9ed7fcd865fe3d264f3b
-
SHA256
129467623307928e4bd892bf6320cd2f4c791e5d91d374036469ed09127dba45
-
SHA512
b9e00ef859dd5d7fbad734cafcd1e1e4e4eb9c0b73d28521454ce5d3eb5a0703628c840fd6521036a95e292d45ff05b74437b58f1fa0bd60f4173999f5902ca1
-
SSDEEP
12288:mvHj8FwLm/HSfs/8FL3H2NrabonYpOmXLBjpx3NDauDS:mPj8F6uSU8FL3btOm7Bjz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-