General
-
Target
dab916e4d0746060c601dc67f518c1cd_JaffaCakes118
-
Size
688KB
-
Sample
240911-tkkcsazbrr
-
MD5
dab916e4d0746060c601dc67f518c1cd
-
SHA1
f77f4275268fc3117e7a7b638d3e2c5804ddab4b
-
SHA256
e528bc13b83f49c42230bd4c2f4279c187c0bab57b872e9ca152b52a395c316e
-
SHA512
e6f5a652fe7cf8e1c7ec93dfaedc6193174249ca07bd4bf0a7acb88b7858dd054ffcbd5c5254061f6b18e5816a79334ffe74f0193a2feac6fffe63ae1e20079d
-
SSDEEP
12288:p38MyQB3qyyvP8fhBGA5Oya/DiyA6GkW6CH0HyrQHv3iXL13Q/C8YlO5nERtI:zB3qTP8fJtuRYP64lru3iXLhQ/7nEc
Static task
static1
Behavioral task
behavioral1
Sample
Additional documents.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Additional documents.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://files.000webhost.com/ - Port:
21 - Username:
zinco - Password:
computer147
Targets
-
-
Target
Additional documents.exe
-
Size
883KB
-
MD5
9ce7dbaa399c553d3fbeae037b810085
-
SHA1
474b5c31ccd81f0e4fa74066b02595bf4648bc5b
-
SHA256
c2ae8f03a4c70c1a976ab882238a8df26aebc713cd28e1896f883ea9da1f76de
-
SHA512
ae079383015a9e0fb971d8ff7d77d712fe93d6b6c8aef6e20584308fbfb9b6429c2b299270a7361959dc7217b190458f3cfcd3bb2081069c81df50a68d7af693
-
SSDEEP
24576:SUutasoWS0F8JVJu9Yna8PrGJ0XHLC/bqx:SUuYsDl+rJugFGJ0WW
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-