General
-
Target
JaffaCakes118_f2f3c510a732ac54a9f6dfb29a1b7f37
-
Size
550KB
-
Sample
250111-beftaswmbz
-
MD5
f2f3c510a732ac54a9f6dfb29a1b7f37
-
SHA1
3041bfc6774acc9ab771c40b555db81deb839515
-
SHA256
8fa00def0daa09d8bcf87f69c7819d5df2e719c354f4d86ede9a8e1f52a9a381
-
SHA512
4cd9f129cfa97c2ea271dac8b3a0fa5cdca739f5863be1d7d0225cf330aba8f24dc4d195f9364daad352708843daab51ac8e75240f9235f5d977e853f0542bfa
-
SSDEEP
12288:UWZ01xvH93tBWZgipu9Ys5gTe9I8P9Pp/RPIyY+u8nS:UWZWZDALpu9YsK6BP9/b1S
Static task
static1
Behavioral task
behavioral1
Sample
Order_0182PDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Order_0182PDF.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1968500169:AAHyFfTHMojfg0XGRFraaMexoQIFtILzuxU/sendDocument
Targets
-
-
Target
Order_0182PDF.exe
-
Size
457KB
-
MD5
5e8eec1bdc70abb4e3be93a843eeec30
-
SHA1
54d7e644784ce87e47835f6d19db1da9d6425e40
-
SHA256
2728be4adab2d8fb44d7b076c1beace4142d2996d72b0f2af0f27d7aa9133505
-
SHA512
99140085f60884b6cfb3ee4c5c5b569f86e043de3be5960ea66621e130719b5697529e67032bcacc62fff088207aaf523c29093d120e0c32f7b66e7f28e13e1b
-
SSDEEP
12288:WepTHjsJ1MNKeRWVmEG+j4qY1ZkrSLgy:TTDsYYeRWIJ1ZC/y
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-