General
-
Target
074d63cbd8c78f769bbd87e7490a2442_JaffaCakes118
-
Size
226KB
-
Sample
240429-k33seafc71
-
MD5
074d63cbd8c78f769bbd87e7490a2442
-
SHA1
acbeb64ad317da06be790c34bea251751bf77f87
-
SHA256
5955f46583f4924d71111f2da328a70cd8992785d56c0452e8487522d0bff654
-
SHA512
706eae611daa57ae8174848e1aecd487fa2daaa1d95c8d82aa325fa268d3e677f249bd332569b83f715b1646ca7ff4dff1c6c9af4efbb2281de68741da979fda
-
SSDEEP
6144:ZUqvMbb4WnOol337QbU5xp8LqSRCjQEgmYLicfBQILqWsWL:aqvMX4S337QbUlSQkEfxAvL
Behavioral task
behavioral1
Sample
Factura august.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Factura august.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
Factura august.exe
-
Size
702KB
-
MD5
a7c001a554d70ce3d9c507f5dc96cec1
-
SHA1
49fd5f79bf4b7114b944df71794c4f973a4bf3b5
-
SHA256
810283414d0227a30fde6fd20593769cfc268a36981c0012b541be996a8c6836
-
SHA512
f0487ff91282ce859a92b1e7c5aeed68c1ae02aa6b9e124be5e4dcd46588e4b1485d64e665cec0c1c54a72ec76417e17310372a76c4ddb5f94c798d3602d2bfa
-
SSDEEP
6144:3Bz+EE7pnoxuHlzPUPUHogdOURe572Gq8jV5lAtHEseUOuu:3d4zdUPUHoYSq8J5IEseUOuu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-