General
-
Target
f3b421c78b3c20f775f9d714c6798a90_JaffaCakes118
-
Size
579KB
-
Sample
240924-qbsq1szaja
-
MD5
f3b421c78b3c20f775f9d714c6798a90
-
SHA1
86197262e9558be3d9043aaa9abf208465ba3d48
-
SHA256
0365a5f4a30b1f0e838983474e729f9710f4058335ce736046c60ae0bee6e302
-
SHA512
c9efd95e1825ac7f719227ad166b3b06d266c9d60556325e67e2415352cdd3f284e2534b25b9a7b6652b279abb4fe0541315399a83ca1ee2c27a1cd3246f7632
-
SSDEEP
12288:jbWiWrzjiPcQ4/iRy9YHXSUJ2FAuZq8lBdUXqavP6oyO:XSLiRyNUJ2FA6FBuXqavP6oyO
Static task
static1
Behavioral task
behavioral1
Sample
AWB-7739-993882-0009-439-110919-6822.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AWB-7739-993882-0009-439-110919-6822.pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
AWB-7739-993882-0009-439-110919-6822.pdf.exe
-
Size
766KB
-
MD5
d90d0ffa2439b4d0af69d918acb80ee5
-
SHA1
e565c6ac33eef8bf1a742cc269834faccda56cc2
-
SHA256
b19763cc6a96371126592c98940902723c2093c11df61475f3e405cf66bde9e1
-
SHA512
51c483e4110fdbe9f329bd1097cc7dfd5da61d8d9dab5b8466bd2218d3e716cabd15f455a6d1f73e87a0aef2927d54709e6b93e96d27a0f34dbf4bd435b6afd5
-
SSDEEP
12288:EbEMsl5pPgmnAeoM702ihQWJH9uUO+n57Zq8lB1UlQOO3+U:EbEMvmnLjyMUO+n5tFBmlQOO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1