General
-
Target
NEAS.NEASNEASca5c1fefe9b9347b995dc040b7e50b867be70729041afffd475ce7856f394f5bexeexeexe_JC.exe
-
Size
565KB
-
Sample
231013-wrnd5acg6v
-
MD5
f5e7384a1bc72d14e0c9b3109cc595c6
-
SHA1
afdea7d8046c310f5dfc1f3e6df4bdd3feedb896
-
SHA256
ca5c1fefe9b9347b995dc040b7e50b867be70729041afffd475ce7856f394f5b
-
SHA512
50a9c376c6eadebeffabba0f680e7ed881ebc4d66cae892c1688e733a985f79e46e707f2113c065ed22f4c139a42f545039cf050bc31f7076dbe1da6413a8bbc
-
SSDEEP
12288:AvotmvzL372n+abA5crtaOTLwROdgmeZSMOPwJzufH:AvotO2n+kA5crtaysRvRuIFufH
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEASNEASca5c1fefe9b9347b995dc040b7e50b867be70729041afffd475ce7856f394f5bexeexeexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.NEASNEASca5c1fefe9b9347b995dc040b7e50b867be70729041afffd475ce7856f394f5bexeexeexe_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
colicontjal.org.mx - Port:
587 - Username:
[email protected] - Password:
@EO$07[XSZw) - Email To:
[email protected]
Targets
-
-
Target
NEAS.NEASNEASca5c1fefe9b9347b995dc040b7e50b867be70729041afffd475ce7856f394f5bexeexeexe_JC.exe
-
Size
565KB
-
MD5
f5e7384a1bc72d14e0c9b3109cc595c6
-
SHA1
afdea7d8046c310f5dfc1f3e6df4bdd3feedb896
-
SHA256
ca5c1fefe9b9347b995dc040b7e50b867be70729041afffd475ce7856f394f5b
-
SHA512
50a9c376c6eadebeffabba0f680e7ed881ebc4d66cae892c1688e733a985f79e46e707f2113c065ed22f4c139a42f545039cf050bc31f7076dbe1da6413a8bbc
-
SSDEEP
12288:AvotmvzL372n+abA5crtaOTLwROdgmeZSMOPwJzufH:AvotO2n+kA5crtaysRvRuIFufH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-