General
-
Target
d0e2112790995d909ce7fd9abea65b07_JaffaCakes118
-
Size
453KB
-
Sample
240907-cwhvnazhkl
-
MD5
d0e2112790995d909ce7fd9abea65b07
-
SHA1
477baf5e685c80485d04955e2c0eb2e71a538afd
-
SHA256
b1af5a3a684f0596d404534607a2ae8c8cb79996fbbf7081ce6b854e861168f3
-
SHA512
84c32acdb87d187512eb1a1279d5fbb141b111efd0e78e1d13c001ecce3b9324bd026e949465af36bd56610fdd0887ee28c60aa7b7a7d1cc123b33167df533eb
-
SSDEEP
12288:SN0RXA9HbPRE/YELhRebQsCJ1jx5bCrV9cbNic:yMA97U3ReMsCLzmVSN3
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Swift Copy.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.seshsupports.com - Port:
587 - Username:
[email protected] - Password:
User@40378
Targets
-
-
Target
Swift Copy.exe
-
Size
679KB
-
MD5
c56e32027ccd7a04db2cb6ebbb39bcf2
-
SHA1
36615574cd8728ebffd48a89f39760752451bfd4
-
SHA256
a7dc1b812cdc25fb3eb7a0e8e9e32e75a395b35621ac0f743cbccfaf1da56b51
-
SHA512
c5b2f6c30950cc7cbb084dedf89b00712e40ca88fcedd6dd722c66da27f335f1e21879a5ff38802d676e457bbd5ee4554b1f85f3e3da2212722adaaa4c76a47e
-
SSDEEP
12288:TRP56V86cnMH/1+UOoiXCjuQ1/9+x2bJrk83MqPIrRN:R56VKSN+7DXiuQmA1rkWQrn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1