General
-
Target
63b7fe6ad2c3dd2b1a0b829cf076c6ac_JaffaCakes118
-
Size
461KB
-
Sample
240521-sfeq3aaa4t
-
MD5
63b7fe6ad2c3dd2b1a0b829cf076c6ac
-
SHA1
442c48fe65b3563f904bcbda9933d6feda8d18cd
-
SHA256
51cccbc60b6eee19aca1e805a04a850732145da33d59a441b947028f57701b5e
-
SHA512
518de95de9d4f0cf28dada0c4f90786a1c3b4c7aa0614c41d5ee10d00e03ac55c5e8c8d3a88c0c042fce5009e2eb468c93bc3ead7cd1537ec5ee3e42405d2718
-
SSDEEP
6144:AohBJVz3dA9XdWJcL7ukPCl1RfbmObGAfgDVyb+ZERa6ZVGfpLJRkf3jI1sUu3g/:3jEbMRfbmObrYkb+ZqvWxJufT4sC5j
Static task
static1
Behavioral task
behavioral1
Sample
Statement of Account - July.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Statement of Account - July.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.intelligentprotection.co.za - Port:
587 - Username:
[email protected] - Password:
^RBH}Ta%za[I
Targets
-
-
Target
Statement of Account - July.exe
-
Size
857KB
-
MD5
f04786f6bf7b434b223f91ab199ecd9f
-
SHA1
8b3a7044bd44625d89b13bc56aa4d3e0e55c3ff8
-
SHA256
0cac72041657fe3141601ffafa5410b13128aec0f6e8cceb23fe7c7cb676d12e
-
SHA512
e088d4b0bef96b19606078c8e1dc685e91ff801ca97c2e64eb7b044e4430ef25019150599ef749e4961e899fdf7e347d4ebf1e22659343b31063b58b7b4315a9
-
SSDEEP
12288:FHlYcrKanXHzeEjMx6p4ddVvjUip3GKfm8LonhSumQE4VAzdNEOugUgDxgcF25Jt:FF7OuHzkK4d7403c8UnpedN/xkcdW
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-