General
-
Target
d2e890ee033ad6553f57360c575663bf_JaffaCakes118
-
Size
442KB
-
Sample
240907-1p6vxaxckk
-
MD5
d2e890ee033ad6553f57360c575663bf
-
SHA1
d9181d32699824fa65d06fb4047d41a0a68aa756
-
SHA256
29332540c3c2a713bd1462ff5d4f80b679b80f81687c4a2652ccdc25d9dc26f6
-
SHA512
a7e280084fd46572fdd7ce4b70b2beae6d21001129b4471cef91dd42d02c7dee98a84b0c71af29f03da569f87427450267fe6ef26d64eb3e40b089e2e18db27c
-
SSDEEP
12288:gxa0B8DiUGQNMjPd0eThiGfTf1ys2m9W6iYpj/P2BD/RezC:ka0BQqmy08gDmk6iY9OB9L
Static task
static1
Behavioral task
behavioral1
Sample
Openstaande factuur.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Openstaande factuur.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gascuenca.es - Port:
587 - Username:
[email protected] - Password:
gasW204@Z7 - Email To:
[email protected]
Targets
-
-
Target
Openstaande factuur.exe
-
Size
536KB
-
MD5
1de145a52d4d62164c4ff3dd5a9705ad
-
SHA1
1facc670ae58832181eae43331253d30f36122ae
-
SHA256
93d22d39577ab983c75badd9019b57420a4e2bfc300d6a37d90885d823396058
-
SHA512
8f3930501aa2a7c147830a77f3683c7e348a3ec5f0d925b9ab4c15df0988cbc0e6b1f22920fd0f8188d1bda992fe0cfcb9fc4260ab8222b8b8dd425e7c488b94
-
SSDEEP
12288:8Eav2zv1gaG1SDq7+NUwUeMB2y4nyGlNrzVWfZb:R92aGqScqsZHr5Wx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-