General
-
Target
JaffaCakes118_168fe1623df8b35d77fdb3c9931375940f6243ef7d5fff67f41020f06aae4f2a
-
Size
613KB
-
Sample
241222-glnqdawnbz
-
MD5
77163c8ebcc6193e2e0252d29a711551
-
SHA1
5bb15580cc94fe01824b80326cc2d36d5ef75132
-
SHA256
168fe1623df8b35d77fdb3c9931375940f6243ef7d5fff67f41020f06aae4f2a
-
SHA512
58a3e1e1dcac9f77ad3c1ac35e3ac78d5be102a2491b3e7ddd48b0acd4cb545de6d831e052959ef741494e7824517493d34a3709f7b717fc621883e6f45b54db
-
SSDEEP
12288:4hW4SQPpZuKEYXrDmaFw9WilPu6BTxHTaZDcBIV84XRk6XjIxEhFsV:4AQP1E6rJFwgCtEcBoRXHjIxErK
Static task
static1
Behavioral task
behavioral1
Sample
30f816e55b01b1e22af3e9d7755bb75279b7e6f38eb2ffaf790d6234e5036709.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30f816e55b01b1e22af3e9d7755bb75279b7e6f38eb2ffaf790d6234e5036709.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl/ - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
30f816e55b01b1e22af3e9d7755bb75279b7e6f38eb2ffaf790d6234e5036709.exe
-
Size
651KB
-
MD5
70089ee71f366b852ab6fdd1f6b57b55
-
SHA1
76dff305a3093b266e41bf5b6e959e69f5846808
-
SHA256
30f816e55b01b1e22af3e9d7755bb75279b7e6f38eb2ffaf790d6234e5036709
-
SHA512
1086a6e76200a555c6fb92b5dc8efa275162597a9ce197350fd39f00cd6ed3e26a57d6f37091423265d282dd58a20bdaab5898e7f00b9f8b2dfa24d777abb937
-
SSDEEP
12288:OxZGzPK6N78EkOAjQ6RHKfKvCFNRMcqe7ahktbl07kyLL1XXMQ+u:r97zrAjQ6BKSvmRMrLkNSoyLJnM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-