General
-
Target
fdfb7f3a01e04bb271f670877d6b143e_JaffaCakes118
-
Size
412KB
-
Sample
240929-hfcxcswcrd
-
MD5
fdfb7f3a01e04bb271f670877d6b143e
-
SHA1
956f0ef514775931c21b1d4ac392299525f01938
-
SHA256
369a7731de6cd9b19a81591905150186097c002237a6d4c3c966ad449ff4ab30
-
SHA512
223117593ed68da75224947c476f463930b83d854fc50737cf782d1ae138ec9f8a67d3dd7ec954a404f982c043e0e97f8f20431969f322483d2584034dc2dba4
-
SSDEEP
12288:HbnspONGCDe/KLnPmOfiBm+QB96Z0PlRjSMdahlyJh4:Hbnw2RLnuaiBEBo0PlRWbhls4
Static task
static1
Behavioral task
behavioral1
Sample
NOAH SEPTEMBER_crypted.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NOAH SEPTEMBER_crypted.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
7*noaCk_l6G+
Targets
-
-
Target
NOAH SEPTEMBER_crypted.exe
-
Size
537KB
-
MD5
48fbf3b3e6c295d69f79f7efbe62cacc
-
SHA1
0c214f6f4d78c3366d91acd70b5dced8bf5ae27d
-
SHA256
2434b60331e372fc347f46ac1ede21a078fc11ddea75c52679ab4c49cd3c12c7
-
SHA512
ff6b9c143f0a7ced5e0efdb8bda42f6828fe4962425f2aeb09b7959a437d307fbbd4278d5bc1a24670008a80e5805cd8f1a0e3a67948c62883d8d452d66c200f
-
SSDEEP
12288:svj9v2zv1ghpQBITcQFlU+HWtCzrkQxC:svo2zQVQFlU+2Azrr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-