General
-
Target
eccb913a135dac83f1bbc30fae5e20c6_JaffaCakes118
-
Size
516KB
-
Sample
240920-egekssxcjd
-
MD5
eccb913a135dac83f1bbc30fae5e20c6
-
SHA1
7a1b0f1fcb83671e8efa82358ca987df303ea55e
-
SHA256
f79abc0493c0ff913ace29f572b8914c72cef471a08a6cf8ffdfe5e622060c0b
-
SHA512
9eb8d0690c7727ada57f73fae290ac30ef82c70e03cc943194ed1275e6be58969174637616b572efcbe34e8fc92eea1080a9a814873c221d85e4f1805d1a43a0
-
SSDEEP
12288:bzwZmLyX8tz9W5gUsKKRw+DjfCmgW+oSlMlNU6eCJ:bIQO8tBWfCRrDjr+JMrUoJ
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.tonytonero.biz - Port:
587 - Username:
[email protected] - Password:
XKdnVrM1
Targets
-
-
Target
PO.exe
-
Size
680KB
-
MD5
bfd4641dbe5257b5857c2602ea7b2a73
-
SHA1
9b159263372249b57781100d24d5baad12f978a4
-
SHA256
efb743ce3a7a97e5611ae39b006a8489d5c573eec8bde5f7df3c67210d4c309b
-
SHA512
ced64c7a825589ed83e00516e02b50db608e4ba2bfdd2e5ebaabf92d7da3a0c40123583174cb8f44a84499de00e9aba6d797b48c3ab82e340f05cad86f199931
-
SSDEEP
12288:JPchekXkOa0RLGdYylGc1GT7Z6ZFPqbCAM3E413vCzEzoApCJWX0nSxZYc:qhxKdYJcJDqbCAsCuXp8WX0Sxt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-