General
-
Target
JaffaCakes118_69a6d16e563e335bad162c6750c0ce1807bb96ce12e54bc43af19f6458a0a791
-
Size
427KB
-
Sample
241229-qnslsasndm
-
MD5
cbfb1f4bcfc7c86b05aae71908f099ad
-
SHA1
25829bb82a1e5ca09a6c9a6924074168cf61bdde
-
SHA256
69a6d16e563e335bad162c6750c0ce1807bb96ce12e54bc43af19f6458a0a791
-
SHA512
f2c0968797da5dc22223291844dcf837ea5021ddd437dee0a8ec2b44a61ee3239d7dddadcbcabd4b6c543e479ac87266c4c051164f9c0381e755124310c91537
-
SSDEEP
12288:4u9/ut8+oktP7PPflPG11yha7vSdoC0I/V2RszYvt2R:l/oDlO+WvSD5NXYlS
Static task
static1
Behavioral task
behavioral1
Sample
14.ps1
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
14.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
dollar1.ps1
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
dollar1.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ksdfgxc.ps1
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
ksdfgxc.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://78.138.105.142/ - Port:
21 - Username:
dollar - Password:
Samsaghir786
Targets
-
-
Target
14.ps1
-
Size
1.0MB
-
MD5
b0b8b6e578b962fdb4eb7478e17ffa62
-
SHA1
9bb4326a0ff26a586d6fe321e3180d6dea885d2e
-
SHA256
30155d3d4ccd6801ebca520516e1a3e758c7ea6181fea652befac855deeb7d66
-
SHA512
fc38e92e4a49523693e43e8f042efe6aa4d3a832de33ea2cc41fc4688924be185dc3b2de5d5474955f9e7d904724da08043739a1a661e0b099624343e691d1ca
-
SSDEEP
6144:m+LvE+CG46RmeHYB3uTEfheJ5f0N2dNVGQWo8tbRy7T5cZ8W+axNF9vguT6Ux3ZT:3KG+NHbxzrTTE1e7ihN9brEeDXzq
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
dollar1.ps1
-
Size
510KB
-
MD5
c42d82bfd897477aad6221016be9d6fa
-
SHA1
af3505c7bda32a32cff69f3afc4c676856d377cc
-
SHA256
1308763f21e50778f78dd3fd05b61367341cb52c7ca1b411a0d18610b20c9ede
-
SHA512
f1262f4c95aa5a853ce1f4d1d069c76d6f438c9ba2839cf093472531002c7886a619252be1769d5ebd725e35224e3c2f50bc8ade603ba98216b7ca508894083e
-
SSDEEP
6144:BHJz/Da4narEcyu0c2slSDp6SGxQ9KH+d2QSQ9OSk/RZSht5C5q+Zbe6gy/3be+c:BHhan0cx2ho4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
ksdfgxc.ps1
-
Size
4KB
-
MD5
8d73265b13d4b577e77b0214f03dbac7
-
SHA1
4373f1204e35f84888dae970b207c8a938b78f8a
-
SHA256
2de00bb669b0693a28a2e85678761d7d972aa9f0694e87c6ad6db885281cc8d9
-
SHA512
5c82c9313e7f18683e38a0a1e2ff44763f85978770220378abb2562caf6fb90e931e6814a53a0fa41b7acbd9e752e7c4b5113595fdde4adc4abd9a97b4fe1921
-
SSDEEP
96:6ghajvvOcdR0lChG/HuSHk3FNgQfBZL0W9qgPHHNEA0lcw0lE:GrvOzMGx2FwW9qgPHHNEVEW
Score3/10 -