General
-
Target
046309626e33ad4d0fb4f4937f643fb7_JaffaCakes118
-
Size
405KB
-
Sample
240328-nhgwzsha38
-
MD5
046309626e33ad4d0fb4f4937f643fb7
-
SHA1
3a2de014894f2d44f7bebe8b2a55f22d54e02170
-
SHA256
ece73ec955293ab06c24d68c3813eeadcaff7b169953744859984cd4d51d30f1
-
SHA512
2c0e47db3e3c12deb9923e36f87f0d246209f2510b4fed17b9372ed877edc38e1e98384e6d0f62f402765c840f0df0c16aea5f0cb32bee506375f8c068b8b6af
-
SSDEEP
6144:jdAegMkhBCDzhxXj9J9LhXVb7+Y+oKIzb8o+E1wnJWnXTBMQ/9Z3O6KhObdBrA7s:VSBC3/jLtqY1vgOynEXTKd6oITrAGiY
Static task
static1
Behavioral task
behavioral1
Sample
046309626e33ad4d0fb4f4937f643fb7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
046309626e33ad4d0fb4f4937f643fb7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
srodriguez@beticco.com - Password:
C%)%GWZe9
Targets
-
-
Target
046309626e33ad4d0fb4f4937f643fb7_JaffaCakes118
-
Size
405KB
-
MD5
046309626e33ad4d0fb4f4937f643fb7
-
SHA1
3a2de014894f2d44f7bebe8b2a55f22d54e02170
-
SHA256
ece73ec955293ab06c24d68c3813eeadcaff7b169953744859984cd4d51d30f1
-
SHA512
2c0e47db3e3c12deb9923e36f87f0d246209f2510b4fed17b9372ed877edc38e1e98384e6d0f62f402765c840f0df0c16aea5f0cb32bee506375f8c068b8b6af
-
SSDEEP
6144:jdAegMkhBCDzhxXj9J9LhXVb7+Y+oKIzb8o+E1wnJWnXTBMQ/9Z3O6KhObdBrA7s:VSBC3/jLtqY1vgOynEXTKd6oITrAGiY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-