General
-
Target
d6556ecd4416a0656a9d7dfa2c357099_JaffaCakes118
-
Size
761KB
-
Sample
240909-pw5qms1amf
-
MD5
d6556ecd4416a0656a9d7dfa2c357099
-
SHA1
ed0cc8ea30a677822716158bc60dc1e8285deb08
-
SHA256
135307c748f6df6807adc3e83302e583abe225d19260ab1b7b946d8647fe09a6
-
SHA512
517a34d97be8f349bd440d563f149d42ca650d31557884079472ec7bc4398fcc0dba56c80db8dc8e84e18f1c0b0269b9107137e256ad0c710510133891706333
-
SSDEEP
12288:djZPuyekGknem5uOJd+1uq0F4Q/xPP3uQbZt3jT2Gg6EyDx2zzW/GE3/qI:d8yebwuOJd+1uq0Fn/xPFcT6JDUzzAV7
Static task
static1
Behavioral task
behavioral1
Sample
PO No. PO MAM 20-21 IMP DOCUMENTS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO No. PO MAM 20-21 IMP DOCUMENTS.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
too214365
Targets
-
-
Target
PO No. PO MAM 20-21 IMP DOCUMENTS.exe
-
Size
982KB
-
MD5
5f52ec0346ea8b6b254fa42c589f8453
-
SHA1
22950bb7ab00c4463de35aebf0fd73c98e102047
-
SHA256
15855715a9f9200ec5ec4170926fb9f295b55ba15b331bd9a1031ea0f6baa2b7
-
SHA512
82774d319f563028100cdf62277f774f65c30a7bfa0da0882543801ca6533d47eeb87cb8c2ac20439d282a3cf1a459d6eee1cbda571d203e6310ed2f9b55a14c
-
SSDEEP
24576:+aiZucOaCrYz4jEmW/g+pCJX9UEVWrNvgx9Rr:HcyrKmW/PwJXRVQNvk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-