General
-
Target
07235191bc4a2cb3bd75667ddaf43950_JaffaCakes118
-
Size
607KB
-
Sample
240328-q39tlsgf94
-
MD5
07235191bc4a2cb3bd75667ddaf43950
-
SHA1
2068b25e2b28889e26395be0c401b6f8c7838cd0
-
SHA256
0e3e6413a4c2f3666b7ffa43b3b1b13f470875f410a13c0ec6bbd2ddae3bd8cf
-
SHA512
ffaa3651b51301faa0c782ad80470ba99e80db154a19cdfae4965bb5705896a1109511337c0508898381357731f6cf664026e6d40a8ba4e913259f2ce1bcd8e7
-
SSDEEP
12288:WhvUUWYU6PqKnGR3nEWlf0nRHqnlqw3h/MtLyb0:OMUWYU753ZgBYqwR/Mpyb
Static task
static1
Behavioral task
behavioral1
Sample
07235191bc4a2cb3bd75667ddaf43950_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
07235191bc4a2cb3bd75667ddaf43950_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
emeka@generalbravo.com - Password:
e)cnIdR1
Targets
-
-
Target
07235191bc4a2cb3bd75667ddaf43950_JaffaCakes118
-
Size
607KB
-
MD5
07235191bc4a2cb3bd75667ddaf43950
-
SHA1
2068b25e2b28889e26395be0c401b6f8c7838cd0
-
SHA256
0e3e6413a4c2f3666b7ffa43b3b1b13f470875f410a13c0ec6bbd2ddae3bd8cf
-
SHA512
ffaa3651b51301faa0c782ad80470ba99e80db154a19cdfae4965bb5705896a1109511337c0508898381357731f6cf664026e6d40a8ba4e913259f2ce1bcd8e7
-
SSDEEP
12288:WhvUUWYU6PqKnGR3nEWlf0nRHqnlqw3h/MtLyb0:OMUWYU753ZgBYqwR/Mpyb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-