General
-
Target
f324cbaf1c92792f38cdd8802ec58a0f_JaffaCakes118
-
Size
1.6MB
-
Sample
240924-jhflpszbqg
-
MD5
f324cbaf1c92792f38cdd8802ec58a0f
-
SHA1
30e100ef237ad3772ab983d7b741a8c017ad4f70
-
SHA256
81c2a7b3b6d086433a381e18410566eeb4b6eab9703fdd6cd1bc722f3699feb4
-
SHA512
9b2e80a85901e59348b762d4b487c4001000c30f95fceb5e91097cccfa487a56abc57806e08acb3b87655424a9f4a604d39ac4df22110e196dca13574379a823
-
SSDEEP
12288:8NF5hNvXKJEp1lLNFn5I79IytGBFXa9PSYWhYYT2:8NF5hVXthLXn5+IytGBFXa
Static task
static1
Behavioral task
behavioral1
Sample
PO#LT40097_pdf.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO#LT40097_pdf.scr
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gandi.net - Port:
587 - Username:
[email protected] - Password:
Blessed000@
Targets
-
-
Target
PO#LT40097_pdf.scr
-
Size
1008KB
-
MD5
81fa103169694ade60435f1d37558629
-
SHA1
c1d05d8f37ac93c965f6af66bfcfc93870c44b48
-
SHA256
ca967b546580c35933e3b620342056f75a14168f821dc8ef18f5fc99eed34130
-
SHA512
8b29597cbd58b7d7b644188ac757bd19d53284e03fb998c921532d30140604c5c97e9fa09a862442cdc51da32438eecb01609fb71f8716a5b2bf31bc0c360e0c
-
SSDEEP
12288:9NF5hNvXKJEp1lLNFn5I79IytGBFXa9PSYWhYYT2:9NF5hVXthLXn5+IytGBFXa
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-