General
-
Target
eaf7d756d26c0c93f5bf73627ef35255_JaffaCakes118
-
Size
1.2MB
-
Sample
240919-km1ccazgrq
-
MD5
eaf7d756d26c0c93f5bf73627ef35255
-
SHA1
002ff642474c667cc10fbb553db71f62da1251f0
-
SHA256
d6c664ec1043c42e67388337bbc7461fd5f4b12804f4c4e8f2fe3fdb24bb534c
-
SHA512
70b04d60b71c326139199a9474f67934e36f8c3890554af9d081551a383b1bb08643fa021c3ec09b00c5590a60e7dcd04f5500161618e5b94db3515e0e931fba
-
SSDEEP
6144:FEpBijQl2KUvAjXAYAabyAI4AeLa8xThl+uhctt/e5w8rKWHOzC9h0qWzCLPKB0V:FXhTtFGrKrer0lCTem+zV2wNKP
Static task
static1
Behavioral task
behavioral1
Sample
PO_ORDER.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PO_ORDER.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.makezimbetter.com - Port:
587 - Username:
[email protected] - Password:
Mah3r@34
Targets
-
-
Target
PO_ORDER.exe
-
Size
563KB
-
MD5
80af2be4dcc399e152a5c9d7d33572e7
-
SHA1
a3a4e389095a2e7c35a094a6df20130fb446c4cb
-
SHA256
d8fce87c4a8a86a31b234a0988171d6e1a4647deb272cd65fb2df76950a781ba
-
SHA512
cc2ce0ba2809e327db79cffbb438ed250d3ef6f5df309fbb552f82b1b1bad2c44f6a64ab38e27e57cf7bccd97f8c0048a8fbc1b51de6fb74e25d337c13e7c949
-
SSDEEP
6144:qEpBijQl2KUvAjXAYAabyAI4AeLa8xThl+uhctt/e5w8rKWHOzC9h0qWzCLPKB0V:qXhTtFGrKrer0lCTem+zV2wNKP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-