General
-
Target
7d4a47b4971bc432c057f80f61065257_JaffaCakes118
-
Size
319KB
-
Sample
240528-rr57qaaa83
-
MD5
7d4a47b4971bc432c057f80f61065257
-
SHA1
0299dad957522d862d6fbb9249f52d7b95f6d072
-
SHA256
a091f6793a07f69e6349dccb008cc3ed25e64461566bcaa37f69c7804a03fb61
-
SHA512
6746077efcbf2d5871bcce01a26c623164390d533bc6f92aa190c7032502afae321dcc32b596045d391fd54d7d39698674b0070320b0ab8b7eb030e1347f766c
-
SSDEEP
6144:wX0aJ62WQ1kNG8UJxdequtr8DVrcq98/NS/H9KaUHPzwHepT6vhhs:wX16lYoGX1/9JKagPzoIWvhO
Static task
static1
Behavioral task
behavioral1
Sample
Sample pictures.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Sample pictures.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
JEHOVAH8899
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
JEHOVAH8899
Targets
-
-
Target
Sample pictures.exe
-
Size
637KB
-
MD5
00dd30cd54403721c9f368b80333e70a
-
SHA1
520b1ed79731d8b659831412037f3a66ebf0459c
-
SHA256
5ab5e18b5ffe74e4c3ccf07f2e19f2daf006338022e64806b284eb8e0f0e1c15
-
SHA512
0e8c050ef8dc39028e803923669ba9a9230c6a07d28781b628cc2989f25dffd4a202fa2cc966d5f9342c35fadd3cee68a530cf5c5fee7b8d56ae9838d8ebd1fe
-
SSDEEP
6144:glq6KltUaGkL2Gt2PBo8nBdYE5+nOeXF1KH2OZ+vucSvOyLjoFOTCiAxEFFGGy4X:gMfUaGWFIPUtnO8UHNZiuzSOb7GGy4JF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-