General
-
Target
JaffaCakes118_f8b475c21c3d1a70d4ebbcca138ff7fd
-
Size
550KB
-
Sample
250111-ghps9szldr
-
MD5
f8b475c21c3d1a70d4ebbcca138ff7fd
-
SHA1
dc409cfb7ed0ee58291a5399b77b34bcecadc070
-
SHA256
e02ae21b3c2b90f4ddf9b80c8cf1d56b7eb481ed99b24d416a9ae3acd527c507
-
SHA512
f3a71d6ae0de5f1bb6861e48ab84d4b336dd7bdb182d6d2520bf4c89837362f2a52e10c3136d30308e270559b13cc0c3b648d4a1137251c66bc3ac6a88d846e1
-
SSDEEP
12288:E01xvH93tBWZgipu9Ys5gTe9I8P9Pp/RPIyY+u8nz:EWZDALpu9YsK6BP9/b1z
Static task
static1
Behavioral task
behavioral1
Sample
Order_0182PDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Order_0182PDF.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1968500169:AAHyFfTHMojfg0XGRFraaMexoQIFtILzuxU/sendDocument
Targets
-
-
Target
Order_0182PDF.exe
-
Size
457KB
-
MD5
5e8eec1bdc70abb4e3be93a843eeec30
-
SHA1
54d7e644784ce87e47835f6d19db1da9d6425e40
-
SHA256
2728be4adab2d8fb44d7b076c1beace4142d2996d72b0f2af0f27d7aa9133505
-
SHA512
99140085f60884b6cfb3ee4c5c5b569f86e043de3be5960ea66621e130719b5697529e67032bcacc62fff088207aaf523c29093d120e0c32f7b66e7f28e13e1b
-
SSDEEP
12288:WepTHjsJ1MNKeRWVmEG+j4qY1ZkrSLgy:TTDsYYeRWIJ1ZC/y
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-