General
-
Target
06e441f7f93dafd9c3425532db0161fb_JaffaCakes118
-
Size
452KB
-
Sample
240429-fv31zsbf9z
-
MD5
06e441f7f93dafd9c3425532db0161fb
-
SHA1
0040475885bb35c31aa9430c307e6369e0636061
-
SHA256
7db5974f16db1242a0212877eaf417100c33251811963573ac3eff2b4864fd6f
-
SHA512
a32c56a9f35b8d83fe27291ad0c7ddb9e4e855f9eda4d167113fa485089d27c5caf81b455f18e02eff0c0a12a4d4822b8a308bcb9a6a2b13739be3e2e7722cf9
-
SSDEEP
12288:AcfdLAuFDEiGXSH20+PRYI3tlO5Fmw6G2ztsWiMjWz:AAAuFIiGCHsPSIdKF5A6WiMU
Static task
static1
Behavioral task
behavioral1
Sample
purchase order.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
purchase order.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.yitaipackaging.com - Port:
587 - Username:
[email protected] - Password:
22799213
Targets
-
-
Target
purchase order.exe
-
Size
975KB
-
MD5
63c86be77aff4ce6c9b8b05457fc99b9
-
SHA1
5d3442c88ec022d2029d91633375e7e19bb60084
-
SHA256
f458911cad980b38b8c73ec5b8755b9b5d0d1ff6906ed78da4d5f6ec79b5acf8
-
SHA512
9c0892973d6b484a231f22d4c085fa797c815ef8e0c9c061249b44436886eba6e6cccc185977965451a778edc1ead34051595a68d77873bdf3e680ceba525fdb
-
SSDEEP
24576:KZLUMT+pWX9juJoJeZLUMT+pWX9juJoJmz:KWw+00Ww+0cz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1