General
-
Target
4832dab47b93ea2cd4d52cdc170dd601_JaffaCakes118
-
Size
396KB
-
Sample
240515-1qg8yadg5z
-
MD5
4832dab47b93ea2cd4d52cdc170dd601
-
SHA1
e1caebaf7f20a8caa476f1ccc9d136f1b7b8919b
-
SHA256
59835c212a91ef8bfda731b69b674d6cf0d6f4086cb67e40ee2dff16ede8294a
-
SHA512
f83787cecf9ee72d4c7cab437c47fdd03461a32c5fe3db2db79f89a2889357bd00aa16b0558dac6a2b823e21c0cd91b1693222414575aa1093fb219c7c51056e
-
SSDEEP
12288:pb80RwhCEs4AdHg/bO/PQ3TK3ZUDNoVoSkZJf:58x64AJsaPcc25fSkZJf
Static task
static1
Behavioral task
behavioral1
Sample
600595460 DHL_AWB no.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
600595460 DHL_AWB no.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.agri-chernicals.net - Port:
587 - Username:
[email protected] - Password:
x(jhBsE7
Targets
-
-
Target
600595460 DHL_AWB no.exe
-
Size
420KB
-
MD5
a113ca929d6eb66eb6bff41cca249112
-
SHA1
2146d97082a0dec67743a5c980ee278d3ce657d5
-
SHA256
0cd4e80d3ea65f95f633e4f475ab1027d064c24ac73db1dda8c997aa62f1b08f
-
SHA512
82498fe54db055359807625d2b272c41deee6e166bcaa312b2c91f66746781a1b305d820c13f7c68b05106ca1e57b7c550d565623ee056b8545dc654f802ad0b
-
SSDEEP
12288:a2iN0zYdHebKiYHxL1Op6Aie72VPps1NKBwr:a1AqHeb3mL1y6uas1NKBw
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-