General
-
Target
e08b8cd967346564228a563b4667c356_JaffaCakes118
-
Size
508KB
-
Sample
240914-tmk24aselr
-
MD5
e08b8cd967346564228a563b4667c356
-
SHA1
995d58e6b0b394ff50ff7e56935c18fd3671dc27
-
SHA256
7e0a52b8af56ba75bb5ed2e53f88abeb22a8189cad0ff037f811b0e817e3cb02
-
SHA512
c59689f8cb0057cb3ad11950e900e465f24751a788adf6a6aa141cb4ac3e3a7e117b6628d42498c16334d251c4cd8174bfc15a8046e85b4807c21c8d6a6e031f
-
SSDEEP
12288:Fw0L8vcDKDcT7d4ZQmqEIx4g+XkASELJr:m0Av2X7dqXgCksZ
Static task
static1
Behavioral task
behavioral1
Sample
URCHASE ORDER#9956859877Pu.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
URCHASE ORDER#9956859877Pu.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
URCHASE ORDER#9956859877Pu.exe
-
Size
560KB
-
MD5
be4998e0bc94840a6ec8e7954ff65ee8
-
SHA1
1bc3c82eef34855a63f875c6255f37e1bd6f1c13
-
SHA256
1c08dc787c96a354cb054913d8b54626fd00485d67e0ee71e10059245c07a86d
-
SHA512
924227d8aa249c97e79e975941b3ca5127843c5aa5daa75cda56dce06a521c4776d03f7136747612e170c4ed071fdea87020c3247418d7e3ef8885d71834ae1f
-
SSDEEP
12288:zxceQPR0fTSNPIAQhBaZr2DqRSVHbzrrzaEs4asfeXl9zma/qUGIP6/:zxvCUiI5KMDqRw5s4asmXl9U
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1