General

  • Target

    f4c07521487e028a63b7dfd3778d5d36_JaffaCakes118

  • Size

    655KB

  • Sample

    240925-abyn9ssgrk

  • MD5

    f4c07521487e028a63b7dfd3778d5d36

  • SHA1

    066c54694b04efa50866dfb1f9141569792b13df

  • SHA256

    b4f725b056394286a3c95a2dc158c00e7f9dd5472715acfedbb737a1a8deeab4

  • SHA512

    6c560742ec5a7f9c20f527c60b07789b11d61193c2a090f4200b5ed4a92b413ccdef9b5e7745e429a052cc258dd57f80a8ad40d275b4ee6900d62ee4f3ecec0d

  • SSDEEP

    12288:a4AF9DIb/8yW/dRaW2+k7Aia5XSkU/SfbXsv0EZyhVolQwuYZAmZgfpG9WShU:ZeDIAcH2okuRvxuVATZATU9U

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    server283.web-hosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    L8OYn!$gh;8r

Targets

    • Target

      PO.2200041757.exe

    • Size

      749KB

    • MD5

      c3ec4a8aa7918704724356d0a46bf4e4

    • SHA1

      beffae358f9b2bcca9d969261c99aa2f7e553a91

    • SHA256

      db8d3c32ee69788198baaa3b9ee3b2dd7c2a18ae090b6c336c0fd89d6c73bd21

    • SHA512

      a287a753d098c4a55950f58443dc4e21ed3b504f7e3ad41a707db839dc547385fda9d8fe937f1ea6fd49a0c0378438fc106ab5332dafe898444e2378e06cd787

    • SSDEEP

      12288:ZDI9QaV4j0frPvO1ig4jBqA+50kC/Gpbls90EJyFVSlQoseFmD0DpG3IS:Zk9XzPqCqANkUB9hYVqseFvA3

MITRE ATT&CK Enterprise v15

Tasks