General
-
Target
fcd3269ebd515cd92d4b6259447208cc_JaffaCakes118
-
Size
452KB
-
Sample
240928-wcczva1ckh
-
MD5
fcd3269ebd515cd92d4b6259447208cc
-
SHA1
ba8771420594947049eeb6ab88cc62025032f808
-
SHA256
c2c2b095360961b24b797f890e9d9e01e47151cce094b094179cb09472f74d12
-
SHA512
7b43bd6d213b72e36958e89e6a7422e8064a2cfb7e9b657244956085c9d54fc11e910c70d262ff468f0a18e5880e236818303b778041445d3cbcfbacf3c0fec0
-
SSDEEP
12288:Kitmw/wRC7GGQteXgaB5AJtfugcIkLu/ZlWCGoksfQ+mh:Ku0RCytPDzLlWPyVmh
Static task
static1
Behavioral task
behavioral1
Sample
SANTSSWK20100001 S-JF 2000133.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
[email protected] - Password:
mother@200
Targets
-
-
Target
SANTSSWK20100001 S-JF 2000133.exe
-
Size
665KB
-
MD5
b611aea937591e0ed71d5419c8db438e
-
SHA1
332c092871569bd366a911768d242d2c6971cb8e
-
SHA256
319379237e8c63327a6ce286135cb3355ee2a592742a70e03c00cc0c351d25f5
-
SHA512
1036cb32909bb9ff18e53f986782f828e3742c37ef07505d7cbc59e480e573394df3bbb849c098de3e0aa7c7c7f5e598382b4261f4948be8839f7e96f48a2ac7
-
SSDEEP
12288:qpZ75lNi/0ux6qCEt+Fys4wdakntbwYgeLiT1lNWkuIQQ18vOESA:qHvNC0etD8ntMEulEkaQ18X
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-