General
-
Target
e686b6bcc27a818ff088aa98bcc0c12d_JaffaCakes118
-
Size
513KB
-
Sample
240917-lkdagawdjj
-
MD5
e686b6bcc27a818ff088aa98bcc0c12d
-
SHA1
44f249fd8819c277d83f6e435db010dc2f916aac
-
SHA256
760f9466fa2fdbaf89286ba7c48b6746827a268e6d3ac4e20f377d15a4c09b2f
-
SHA512
207b7312d38fa6206c5f0929357e76ed179462e273e4980bcaf11bdbb2c8e76404d90aadfe05fc9165b2e1e92b5e218d47674a66569afc9a2f193f551d6cdae4
-
SSDEEP
12288:v/0UDLqm34XJuF/71Q6CU2wan922o/nF+hId+BSO1fgGhpYK:v/vDN459Uin42oNcId+IO14Gf
Static task
static1
Behavioral task
behavioral1
Sample
DHL 08102020 0013456 09876.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DHL 08102020 0013456 09876.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.wtgriderline.com - Port:
587 - Username:
[email protected] - Password:
wyiKluF9
Targets
-
-
Target
DHL 08102020 0013456 09876.exe
-
Size
770KB
-
MD5
7ba4cbfd2c65ee56f79122c087a5cb3d
-
SHA1
b0952fe773b43850742bf8ca0e7e69b87e4042de
-
SHA256
1eb80076d32a7919086f64f0fd8bbb87f2116992719c9d67e679f3c76a2e9392
-
SHA512
d6695512546c6e77d40e4a25b76dd79f50323ee5dc3cda24f149b74d07ca2fd1f4dc1795e738d6b137ae311104a6fbb79811676db13d7f902b6a7c9de680067d
-
SSDEEP
12288:1jR4XZUNvv1y6kU2KMn9226/Zz0zIdKBxq9grpiAeve/ckjQc:X4pXU0n426ByIdKyCQAev5kjB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-