General
-
Target
0b637af8c527fce45040d8198b5f1c28_JaffaCakes118
-
Size
656KB
-
Sample
241002-s22gysxflf
-
MD5
0b637af8c527fce45040d8198b5f1c28
-
SHA1
2f663dca58c3a24145606ba227455e89857bdc9b
-
SHA256
43a00a8169169591980ee712afcb08fed0e8f91c838facf86402b1d375dc9028
-
SHA512
7f702f5fe567b18181b471438d6671d3022649298052f996cb4fdbd8f79f26b63a7d3342a6f2c69b633845f857f705271e2abc43b801675aa67b235365e97552
-
SSDEEP
12288:XA5UjXH/UVGHVKUGtq1mZMv8pKiK8NOX1uJ+ORJCyWpqbM4:XdrH/GGQk4MvviK89fRJCjpG
Static task
static1
Behavioral task
behavioral1
Sample
xMqfnsbTjvL3BfW.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
xMqfnsbTjvL3BfW.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.crealuz.es - Port:
587 - Username:
[email protected] - Password:
Pu10?as1 - Email To:
[email protected]
Targets
-
-
Target
xMqfnsbTjvL3BfW.exe
-
Size
911KB
-
MD5
d6c2b0676223fb53b5c7a37e56f67705
-
SHA1
fd8a4ca0e5d97e6e3860948ad1447cffaa62801d
-
SHA256
c5435d2c6389eccc5d37b9e4f16764fa41d716f3b5277f1303f0f1a78133e177
-
SHA512
66640c8f8b4d4335fd69ed1d4a917256b3212f8abda3223f6f0853af8d41294fac95297c14141c6299540d24b483d182fbe1a88c313a78b51910ee618f968be8
-
SSDEEP
12288:Wdh3Upwmtw74E18R8tAYEU7CjcGI8i9gYH:uh3UpqF18aO8GI80H
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-