General
-
Target
075e6a6eb96d19b5698dc333759d3dc8_JaffaCakes118
-
Size
393KB
-
Sample
240429-lrh5asga3w
-
MD5
075e6a6eb96d19b5698dc333759d3dc8
-
SHA1
901fa8f0c764128577c363fc914bdc2561427f9b
-
SHA256
944d736ac7cdb40fd662857f2bee143199a577dd10f8bce2238a217d8e288d61
-
SHA512
6f93e91da425a8a7752ee7f77f4a202c91494eeea03a8fac932842eb3b3cf1c4060d89b36db8843e47e536faaaaf93a5aeec945769ab3d2392aed916fed766e5
-
SSDEEP
6144:M5ToQ0L0lu/OvgvmLhjbDf8VdMvTB+jTolv8DQp5OAz/1qP4aWPn6qf7tpPS+NhI:M4XjqHSdMUjFcOAZqQtntTt1S+NKxa+
Static task
static1
Behavioral task
behavioral1
Sample
purchase order.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
purchase order.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
babacj1234567890
Targets
-
-
Target
purchase order.exe
-
Size
697KB
-
MD5
2ced991e90540177a9552ba01d503fd5
-
SHA1
5a563db3b5544f5a185ca85a0b31eedd283cf55c
-
SHA256
75f614af5672c9dd40b750d6af0c34dc2f930deb72ad1c76aeba5ac932f57169
-
SHA512
3185f159599b643c8ea3af55e03e044223512b8408ce0c1ca019b6d3986fc6bb21b3c169d6457331ab9d4c81682d0643064b126b04793151528acbc71a5567b1
-
SSDEEP
12288:PsT8i8L8WM+QF6M4fWr+cvT6zbejd1PAn+OxwAIYYQNlvBMZ+x0Art:0oRXoEJBboIn+Oxw3hQNd+kx0Art
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-