General
-
Target
13d0f6675484ea8a11fb1d35cbcf2b74_JaffaCakes118
-
Size
648KB
-
Sample
241004-salmeszfnr
-
MD5
13d0f6675484ea8a11fb1d35cbcf2b74
-
SHA1
53eaf522fe74ec74e8ac883ff21aea4ab378675f
-
SHA256
79864f364518fd1b2715152d7572619beb93c90fcde5c8ad9d90772df36d61e3
-
SHA512
a774dad0f7f41cc628f4dd146a19e3a1843b568315358bc704bd6474d5c36ecf5dace658e0cb154917da290dddfd6fe3e76da6aaf3f4b7f7868527c8caa3925d
-
SSDEEP
12288:QHSgzI9xlS3xFIt46vV4Rw2CH/jpxsFklbncA0g18ppB7y49KB0VP4mWYH+O:QH1MuxFmNyqHrpxs+loMgPKgP4m
Static task
static1
Behavioral task
behavioral1
Sample
Invoice Copy--SS21-22185.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Invoice Copy--SS21-22185.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
uscentral50.myserverhosts.com - Port:
587 - Username:
[email protected] - Password:
waters@789
Targets
-
-
Target
Invoice Copy--SS21-22185.exe
-
Size
735KB
-
MD5
de14a9a68222535e7607d779bd765693
-
SHA1
c5f7c6c381f94412c615c653b3d32fc0ff214c6c
-
SHA256
403bb6e9dc90881b21455b962d27a1ccf555585645eb648ad3b29f94d9265aa5
-
SHA512
9260891716b6f48bb1b2a9625ffff02b277e912630f876e110f8820153ecbd34eab8278b2d96d3e3837c185695b76b5ea35b7975face69aaed7d7bbaa846d575
-
SSDEEP
12288:G+G82iNeHK7z8EzZ1q2hsKZQrwcflkNA7MqGzeejAZ2a/IGRUdZ4xCmrx/D:d1b/Phs2xcdwFq0ee62aAGRUX4xCCD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-