General
-
Target
05270120d0e5f9d72a2809c6bf5180b0_JaffaCakes118
-
Size
440KB
-
Sample
240328-n95r5ahh23
-
MD5
05270120d0e5f9d72a2809c6bf5180b0
-
SHA1
ba724979e7f6f46ac33e096180ad531c1a37e9ca
-
SHA256
0a2521fb76fe94f9c8dff781b757fde0eabebb9abcc5038a6e2bc1a0fa17458e
-
SHA512
647e209489afcf38c81ad61060c5e70e4a6d0d5aa6a2a4941cbbbf1980cb4252fdb5a180f39a5b8556d4e9974350e56f47dd9db4db74d81bb84e992c9d56fc1f
-
SSDEEP
6144:lr9zg4gmCWSDlon+fRzC/kHrMPmH9ZIGpn+5dEeQrVQFqrxNNnnLazI2YTg7X:DKbDJfRO/+4PmH9ZIA+ApLazxKg
Static task
static1
Behavioral task
behavioral1
Sample
05270120d0e5f9d72a2809c6bf5180b0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05270120d0e5f9d72a2809c6bf5180b0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ecurs.ro/ - Port:
21 - Username:
dropbox@ecurs.ro - Password:
t&,QuY0fJi5R
Targets
-
-
Target
05270120d0e5f9d72a2809c6bf5180b0_JaffaCakes118
-
Size
440KB
-
MD5
05270120d0e5f9d72a2809c6bf5180b0
-
SHA1
ba724979e7f6f46ac33e096180ad531c1a37e9ca
-
SHA256
0a2521fb76fe94f9c8dff781b757fde0eabebb9abcc5038a6e2bc1a0fa17458e
-
SHA512
647e209489afcf38c81ad61060c5e70e4a6d0d5aa6a2a4941cbbbf1980cb4252fdb5a180f39a5b8556d4e9974350e56f47dd9db4db74d81bb84e992c9d56fc1f
-
SSDEEP
6144:lr9zg4gmCWSDlon+fRzC/kHrMPmH9ZIGpn+5dEeQrVQFqrxNNnnLazI2YTg7X:DKbDJfRO/+4PmH9ZIA+ApLazxKg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-