General
-
Target
JaffaCakes118_29d453ba35435891d53069e6250dcf63
-
Size
660KB
-
Sample
250106-sabr8a1qap
-
MD5
29d453ba35435891d53069e6250dcf63
-
SHA1
ca87eb53200bebfbbec78642aa0458d701ca223b
-
SHA256
e741a7406888ef2c26cf04c5c39afdee7337060e2026c5dbf2033e80edc12c81
-
SHA512
ef82c4e5a935907578e910fb196a42eea9addcaa8e487a82129a2775824aed435456ebf57dd0b9acee262838c42766c2b7905f69e99b3ac3a32f4e61461ee9ba
-
SSDEEP
12288:1wrMG7OnwT8mZgt7DB/orcAjb/0Hr+ZFsYsvb1vtkutHVp:4OnwT8mytZa9KdZb1tku5v
Static task
static1
Behavioral task
behavioral1
Sample
PO PJS-4000079.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO PJS-4000079.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.medicare-equipment.com - Port:
587 - Username:
[email protected] - Password:
AllTheBest777 - Email To:
[email protected]
Targets
-
-
Target
PO PJS-4000079.exe
-
Size
573KB
-
MD5
32a9bdf8ead718570533e627e2b0a15a
-
SHA1
b831848f2be003c7ee06a46e51253807048acaaf
-
SHA256
92aca1894f0493a26dde546c3c9e377be17244b01ee1145a48b997fb56c5e6b0
-
SHA512
7c2e33a1917ee5546106c28b40e8bb9edffbe2ac0fb26ef54925886ffc58a9a0598bcb87c00f14226ee4a2b261512a293e3c43d2cd548bca1e0fad9c2923ce11
-
SSDEEP
6144:ztOD8+cFpaN3KayBY7BEK/DKjP92YltDsEojYGj3Y8v0AAYT91h:ztODQnXYJ/DwlP3qY80Sb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1