General
-
Target
JaffaCakes118_e6eba2fa78a28934329a2413ba145fabcd34210cea4aa5c80da91251b9f12f03
-
Size
700.7MB
-
Sample
241226-2mpdhstnbk
-
MD5
321757a25dffa5f56075a450a64394cc
-
SHA1
ed09d1bfe6f51af3b8c1af1d5d014248c983487b
-
SHA256
e6eba2fa78a28934329a2413ba145fabcd34210cea4aa5c80da91251b9f12f03
-
SHA512
2b4a72c2a7174b660172e866f6eac593ef5333d003bd3eaf1995b292bd27a3b31551ef369c3b948281e250731986a456219dbe22f1f204af6d94e7a0a5f342f4
-
SSDEEP
12288:qmXpM1JCIQfNsVcuoQHk0sM2EHgdAbGTHHQie3LL2J2OXr5HYX:61KNooeHKVTnW3LL7OXr
Static task
static1
Behavioral task
behavioral1
Sample
Order Specifications.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Order Specifications.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pvcasmatavan.net - Port:
587 - Username:
[email protected] - Password:
pbj21Fy8GptZ - Email To:
[email protected]
Targets
-
-
Target
Order Specifications.exe
-
Size
700.7MB
-
MD5
f7f3ac6a915ba3676bed9ef5642d9cf2
-
SHA1
abfeb38415b1301614567227c08727600aed6e02
-
SHA256
1ef76d6263cbe6db036d76ef3e075e17ec90d429c60819deb85f88473bbf2944
-
SHA512
439330e759e4151f2c45b2fc0feda82a26b59882cd5fdbe195a6ead7b161632c30d7816e0c3cb35241de063baae338bbab75864ed71c25bcc06cc2ffd63734ea
-
SSDEEP
12288:umXpM1JCIQfNsVcuoQHk0sM2EHgdAbGTHHQie3LL2J2OXr5HYX+:u1KNooeHKVTnW3LL7OXrJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-