General
-
Target
07a9c9d3de53ce20de184c9b22137657_JaffaCakes118
-
Size
388KB
-
Sample
240328-rkscaahc44
-
MD5
07a9c9d3de53ce20de184c9b22137657
-
SHA1
38db554f03a2b190c7d485c3cb52e6a8d70abba9
-
SHA256
af0902b859d5df130dc0b9f8e0541b88da80683721307249b239e5da98050811
-
SHA512
3f98a41b2d9a274c8a855e4b05c99c9ef575df87273961d0cca5660b7631e577606747396cc65e691ed3318cc78371179a8c48bcd8e46ea5fc284ee88bdd8d62
-
SSDEEP
12288:ABSBmd3IFhfV/AMcIlXbK/sXGgSCkZUKxE:3BRNJZmsXGgroq
Static task
static1
Behavioral task
behavioral1
Sample
07a9c9d3de53ce20de184c9b22137657_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07a9c9d3de53ce20de184c9b22137657_JaffaCakes118.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0023.prod.sin2.secureserver.net - Port:
587 - Username:
nbsupports@seshsupports.com - Password:
User@40378
Targets
-
-
Target
07a9c9d3de53ce20de184c9b22137657_JaffaCakes118
-
Size
388KB
-
MD5
07a9c9d3de53ce20de184c9b22137657
-
SHA1
38db554f03a2b190c7d485c3cb52e6a8d70abba9
-
SHA256
af0902b859d5df130dc0b9f8e0541b88da80683721307249b239e5da98050811
-
SHA512
3f98a41b2d9a274c8a855e4b05c99c9ef575df87273961d0cca5660b7631e577606747396cc65e691ed3318cc78371179a8c48bcd8e46ea5fc284ee88bdd8d62
-
SSDEEP
12288:ABSBmd3IFhfV/AMcIlXbK/sXGgSCkZUKxE:3BRNJZmsXGgroq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-