General
-
Target
d74320b978f04010406195a32de907ef_JaffaCakes118
-
Size
846KB
-
Sample
240909-3d8apswakj
-
MD5
d74320b978f04010406195a32de907ef
-
SHA1
84841ae88cbec155a51c3124632d294d8da7e952
-
SHA256
e1258f72488623713cffc6e7804ddb3287160b9b0dc0bbfb1c47b27a1b85121c
-
SHA512
08479c79ad146fcaf4e1c8f618ac30b4916dca67fcd720f75c57d9ce3866495cb70e2274b5b6c0e94f8d4d677a30cba88d14b075bd4b973d53a3b46f86c1ef7e
-
SSDEEP
24576:4Z2dIby1NvbwxOnfwVwII7oGfKAeiGFg4+X:s6PNQriWGyAXqJ+X
Static task
static1
Behavioral task
behavioral1
Sample
Order RFQ22092020.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Order RFQ22092020.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hadiventure.com - Port:
587 - Username:
[email protected] - Password:
izah@dududu
Targets
-
-
Target
Order RFQ22092020.exe
-
Size
1.3MB
-
MD5
70d3ccca1f07cbe2253bfd8556c201b9
-
SHA1
17c40935843556a51a5b170a0ddf6e3c53e8cde1
-
SHA256
f45bcc09ed89f725b30224e84820e605e5626c3e6777d433f4fcd56419f0012e
-
SHA512
a083e58ec2df2157fc5b0d78d2efe22840cccf3e70c9736ffbc235ba89a4c6cf8db598f0cf09ecb5336af951fc9cd12290e0595e33fe2ab831aed676f239641f
-
SSDEEP
24576:/AHnh+eWsN3skA4RV1Hom2KXMmHaVGCl5Pe0dMpg3ulr+Q+xQ1uH5:ih+ZkldoPK8YaVvo0dNQDf1i
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-