General
-
Target
081964c37b284b77cd71ce356461d1a4_JaffaCakes118
-
Size
1.2MB
-
Sample
240328-rxwv8sge9v
-
MD5
081964c37b284b77cd71ce356461d1a4
-
SHA1
117aaf0d5581a1fa05182af43866f07eb33f20fe
-
SHA256
4149ed81619e6fbe482cc898f5d5796a4bbb50cc2e7c0f4abe02e87d0cc0c77d
-
SHA512
82f689339759f9e7b34c268350871729a8e8d3480e91085e24e2807cf8739318f3ab3054594dab2993e93bdd56eaa6f3e6c4358d24e71666eff3662c01ba7465
-
SSDEEP
12288:YaeRPiwoNdSUTEbDUjFKK1w9y6b76q/tc9t7JQmoo:aeREcZy06bcDQmoo
Static task
static1
Behavioral task
behavioral1
Sample
081964c37b284b77cd71ce356461d1a4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
081964c37b284b77cd71ce356461d1a4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.saienergy.com - Port:
587 - Username:
mmv@saienergy.com - Password:
Sunrising@67 - Email To:
text@dividekings.com
Targets
-
-
Target
081964c37b284b77cd71ce356461d1a4_JaffaCakes118
-
Size
1.2MB
-
MD5
081964c37b284b77cd71ce356461d1a4
-
SHA1
117aaf0d5581a1fa05182af43866f07eb33f20fe
-
SHA256
4149ed81619e6fbe482cc898f5d5796a4bbb50cc2e7c0f4abe02e87d0cc0c77d
-
SHA512
82f689339759f9e7b34c268350871729a8e8d3480e91085e24e2807cf8739318f3ab3054594dab2993e93bdd56eaa6f3e6c4358d24e71666eff3662c01ba7465
-
SSDEEP
12288:YaeRPiwoNdSUTEbDUjFKK1w9y6b76q/tc9t7JQmoo:aeREcZy06bcDQmoo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-