General
-
Target
0dd0a7c77d6282d9c42317193e13acfa_JaffaCakes118
-
Size
685KB
-
Sample
240328-xykr9aeb3z
-
MD5
0dd0a7c77d6282d9c42317193e13acfa
-
SHA1
bfc1a78eb8756d20c62047682c220825d7815b16
-
SHA256
1e60f77cb5374eb751c842742365ab94a67fcf60759591c4737ef1da062f824b
-
SHA512
7f09f3219b2ec2e3014d63e67f9a5c534e395eb66386048680d90cedcda2c84290b0abcd94c32e0a379a07fabe544b4ebbea5b50314cdc7ee306b6a7f7d8e44b
-
SSDEEP
12288:rdUEHp0AvRXphXpYSB59QQgZzNwfwElvSCUA5Ah6Mffvbo81/1IoFrbSTL+K:rdUep1pVBjhgXwrRSRdffvBrb2
Static task
static1
Behavioral task
behavioral1
Sample
0dd0a7c77d6282d9c42317193e13acfa_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0dd0a7c77d6282d9c42317193e13acfa_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.omindexgroup.com/ - Port:
21 - Username:
admin@omindexgroup.com - Password:
Official1234!!!!
Targets
-
-
Target
0dd0a7c77d6282d9c42317193e13acfa_JaffaCakes118
-
Size
685KB
-
MD5
0dd0a7c77d6282d9c42317193e13acfa
-
SHA1
bfc1a78eb8756d20c62047682c220825d7815b16
-
SHA256
1e60f77cb5374eb751c842742365ab94a67fcf60759591c4737ef1da062f824b
-
SHA512
7f09f3219b2ec2e3014d63e67f9a5c534e395eb66386048680d90cedcda2c84290b0abcd94c32e0a379a07fabe544b4ebbea5b50314cdc7ee306b6a7f7d8e44b
-
SSDEEP
12288:rdUEHp0AvRXphXpYSB59QQgZzNwfwElvSCUA5Ah6Mffvbo81/1IoFrbSTL+K:rdUep1pVBjhgXwrRSRdffvBrb2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-