General
-
Target
ef23576ed90e4d18cd3a63bb25a61cd6_JaffaCakes118
-
Size
493KB
-
Sample
240921-f1fsmsxajk
-
MD5
ef23576ed90e4d18cd3a63bb25a61cd6
-
SHA1
fed2b51488c9991b815d2a23bcd53ccbc1bce8b5
-
SHA256
cd0bc188c3dc9db6dfe172f741057a0b125fc5929c918e5bf6da9db4f25a5965
-
SHA512
a3ed94b810c097d8420c652e4a95df3c47e306b8a7d8b09a30b3925936fe0e985a4262bfabd4c2b4ff7d3b0509ad23643722f07cac880d69d9a90ec930591e58
-
SSDEEP
12288:Sti1Prit+ApkT0CZKE+9W/Y32pAIao3xooe/T8iMSpN:HqPk4CAWo2pl332oe/QiMSpN
Static task
static1
Behavioral task
behavioral1
Sample
payment_copy.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
payment_copy.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Blessed000@
Targets
-
-
Target
payment_copy.exe
-
Size
875KB
-
MD5
ac1a8206adb3d237cde83fc94bd94a9e
-
SHA1
70fe09146431ece56856dd12edf21dfb16f0e07d
-
SHA256
d0a5879ca1972047afbdf730b2ef1c09b6b74e93b35d6e1afe68d50261e0c771
-
SHA512
d646d1501c8dfb4389af429905334b3ded96462f4637de5db438a6d4aee8290d4a7ffa49e8acf0f71e209106921743588129adc59aabcbd9fecc731f3af1998b
-
SSDEEP
12288:TqA8+g17rix6knkTSCZKY+fW/a3IpAmaE7xMo6gKoAmQ7M:yEDkOCCWyIpB572o6D7M
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1