General
-
Target
fe9c50bc297b2d678050226a23b02442_JaffaCakes118
-
Size
712KB
-
Sample
240929-qj9z9swbqj
-
MD5
fe9c50bc297b2d678050226a23b02442
-
SHA1
4adb854d3c46f1d952e99c244c52c3a952d66967
-
SHA256
7b0a23e523d1947d62a47bf8260d031a5ef93fd54bc0ada0cb2b0aa43d7df918
-
SHA512
125313b4fcf4e1bbc2897e5e1ec98a9593290a80013a73aca25e9fb1d096ac1965708170e5dafc69bcccf1f97ecd805112221fb76a630a6fa1b4edc25e6e3bbb
-
SSDEEP
12288:Tk7g5+rgIAcK5N8+vifZhHDAtflk+a4m+M7VTPtjT67K5K3tAegdVSBzLyo:o7g5+r7k8xhhHDclk+aJz9pyj0Geo
Static task
static1
Behavioral task
behavioral1
Sample
order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
order.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.smart-noodles.com - Port:
587 - Username:
[email protected] - Password:
info@#$%^&*()
Targets
-
-
Target
order.exe
-
Size
1.0MB
-
MD5
ab1a6b8171f7a1efcb1600b49dfdd234
-
SHA1
f33bb81ccc85722f746980bb1b5aee8033aa4de7
-
SHA256
01cd063d42c49b0612db611805a26403a9418e18f683321012809158bbd27742
-
SHA512
d86e423e05dea38700c0452f2fe9fdd33f0d5c70f3df00681c359cbd72853ea01e900c9797e1cc78f3387060470fa62d383df1dde8ead184bac43c68ec2d1506
-
SSDEEP
24576:ayBcjP6+BO3gdnpGL/QKxP4PH+0Cn3SB:Q9O30+IKxv043S
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1