General
-
Target
29a8f786bc0ecf80d7bafa4217e1a224_JaffaCakes118
-
Size
610KB
-
Sample
241009-djs1jaxhnr
-
MD5
29a8f786bc0ecf80d7bafa4217e1a224
-
SHA1
6bca0dc144af01ce39158cccb1a1f2e24591c690
-
SHA256
5410997bdd858dbc071239783ae1dbe6966fcde498dbdfaccd08999637d5ed6c
-
SHA512
cd3ec7a99e0d96f9240091106d85a4f42120483395a7a46e71432a527144953038766a7a2898fbbda36faef3f69f1eb10c6191bad7ff93b7b0e089ef8872495d
-
SSDEEP
12288:iK8ajDkdtDweNktVsFqEQML6304FUEaOyb5B4bCJIXj0be/TtIYIkn7aZB6usLi7:eajDatUeNktVI1L630jOMT4bCJIXJ/Bm
Static task
static1
Behavioral task
behavioral1
Sample
invoice.pdf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
invoice.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aninditaeng.net - Port:
587 - Username:
[email protected] - Password:
t2weClGi1f~7Elps - Email To:
[email protected]
Targets
-
-
Target
invoice.pdf.exe
-
Size
841KB
-
MD5
4e1495585f1982eaf5368d897f9b1985
-
SHA1
42e38b1a6e8e99e5c227afa2eec7d69a769f9a52
-
SHA256
cbb385b8529f8c65542da6de1561bac167da44c7de62a3f82407182db4aab8ff
-
SHA512
8b85444b75ae621907d28f4d9b8155bcf00a977328c395f5e99523f64176fa641970840de773143f43bcf0a82cefb14cfd21feeaef9aa7fca3ce1a44b76e1f59
-
SSDEEP
12288:7caQxt8JvG8LbgDPwFVt2NjFPAgUhNELNBcYwZeJSL/pJ2bjon6r3ZOHnqYkDo:6qb0wFVMNjehiBBcF4JSFob8n6jEHqC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1