General
-
Target
3a5cdbe831f0268c614be31cb3ad6a72_JaffaCakes118
-
Size
1.2MB
-
Sample
240330-mln9ssdd5z
-
MD5
3a5cdbe831f0268c614be31cb3ad6a72
-
SHA1
5a091259f5d8dbca17df3f60ecbb94f962300366
-
SHA256
62429e1cf10e1a6bfade136b94d855e289769a6b88fdeab744bfd6295570d2a9
-
SHA512
64b70d6563f0d25f5db9e6e6c3f496195467a7407e9c2a2d937776a4acc7f365e01b5582ac195be01e9e0c86a07ec08524ea8ebad1d7d8aed19d72b31c4f5ff2
-
SSDEEP
12288:2hvJIyDzxssh7SFMktGtqB29Ie7xgaHih7INeS/LJgDSs0:umyDF5lSqe0qB29Ie7rHihsNeeVvs
Static task
static1
Behavioral task
behavioral1
Sample
RFQ received Order.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RFQ received Order.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.topfrozenfoodbrand.com - Port:
587 - Username:
[email protected] - Password:
Everest10account - Email To:
[email protected]
Targets
-
-
Target
RFQ received Order.exe
-
Size
694KB
-
MD5
f8b96f721fc20f61ae9becc6b8859d4d
-
SHA1
cbdf4e9d755539f7148d7fc9183a9b7a15a2e0d1
-
SHA256
066a2a8fc33e9061317c324584fa20f45359b743caf41d54885554d1fe9b924b
-
SHA512
fccd4b69b8c16c1f1ab6c067e0123e507235c0b5beac44556014170b057bac97d6e786b0d88dd0b43887835102e1bf8280cec50a6e5ead0598c049a7bbc8a86b
-
SSDEEP
12288:qhvJIyDzxssh7SFMktGtqB29Ie7xgaHih7INeS/LJgDSs0:imyDF5lSqe0qB29Ie7rHihsNeeVvs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-