General
-
Target
10092024_1706_PO-35AF7.zip
-
Size
558KB
-
Sample
240910-vms85swdkf
-
MD5
0ad077628edffaf1cf2ed714d10c4419
-
SHA1
4880e033582bdfb69624757e837204470b63cc67
-
SHA256
a081eb47ad3e8311e319f89967ee6e4900bbde99654e4a489e080fbf5a5f6a26
-
SHA512
d9ef07853a823d6e6bcf9a6815ef2c4f016371c86fb0b3f793f8bd81885a1f72a75c29842d1663a1ea5e97ff3e49aa9eacc8695bae78b38a19df62b14ce4e1cf
-
SSDEEP
12288:nGI2FyKb6pvpzsgj3O8m40AIF8RRZPwDTuj8ciUHRRC:nGr8CEzNqhXAIuHGTj
Static task
static1
Behavioral task
behavioral1
Sample
Wiffle.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Wiffle.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Targets
-
-
Target
Wiffle.exe
-
Size
993KB
-
MD5
8f8a92a532dadc1b18c0e00acf13c5c4
-
SHA1
08ca73d684aacff6ed5d20fa389eacaa87ecc5b1
-
SHA256
8230825616996b27eb6038c8a50d641f823388fa3b9e68a81b210e9fffb19ff9
-
SHA512
9a3c06449756a86e2f6d066858945cd51c72ef11da117a6deec75a069ed98e5ccb4afb7d4a5d5b5e5104cf51315db1781284846b9acd67e144db054909f7b056
-
SSDEEP
12288:6siFwjF/dKa+LhuikYEgciMKFnApF8T3glJQWPuQES4I+5jgrwiis:Fjs1ggciMKFApuTglmW23S4Hgre
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext
-