General
-
Target
JaffaCakes118_ce32a632c86cb240335b0c9af6edcfc7
-
Size
509KB
-
Sample
250109-wbyvxswldz
-
MD5
ce32a632c86cb240335b0c9af6edcfc7
-
SHA1
91b980f92a13f4f5be6f02cff25e4e7e41d74f6f
-
SHA256
14b71b1efd00d31dc7e36f64d6380d639d847845dcdfce1efc396a6f6a3b16d9
-
SHA512
c694d06180fe06b3306ca112f566025cc60e581e8c0249cef4fc083d6f6a4b4c0bf7c6e48cf0d2453dadb8c67e89026c935c50311dc7fb6975f6cb001cfcbe7d
-
SSDEEP
12288:dDjkkTFoy6kIDK4pSTUuZtzqd55O7P2xsTF3TtAfLrx:hjsWIDK4wL9UOjTtGLrx
Static task
static1
Behavioral task
behavioral1
Sample
PXfBQ0n8WFG2Vcw.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PXfBQ0n8WFG2Vcw.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1990818097:AAEwom4DVSnyX5nLZhtvlrvCnmzUsVj23cE/sendDocument
Targets
-
-
Target
PXfBQ0n8WFG2Vcw.exe
-
Size
394KB
-
MD5
bc9378c3c9b2e4d83b5769ee3e46ead6
-
SHA1
4d39365b9d6c4b300026b353969325d520949424
-
SHA256
f2eddde027c81d80d87e113655a5965d2ce36d39e9e6fd2b6c2a054308720690
-
SHA512
0361c57f942c18ee17d0f412984b43e7e35c437bba1d62a317c16234c818863ea5381c47573d75cec57d983b272edbcef67839393365a54bee9ee138b6daca5a
-
SSDEEP
6144:OxYAnYxtrZyubC7kRhGhD3wtfCMi7fF60TBjs86QLaGfSZOm+HT3ePGfp6/kJt8Y:OeAYxLbCPA1CModaoaGqZGH7yUDJVh3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1