General
-
Target
104ec96259b8117e1efaf9d90ef95b42_JaffaCakes118
-
Size
1.0MB
-
Sample
240328-z63zxagh21
-
MD5
104ec96259b8117e1efaf9d90ef95b42
-
SHA1
d5cdfa7d6ca10c4ecdcebac7a547fa644da8526f
-
SHA256
5f4e08ff55f9130c843fb3251856a8bbf945f615050a51fdc667ca113fb2e867
-
SHA512
84dd2aa685d9648f20f4d8396b767259c480ad52d0d9f8f6ebacd237e10789873c633aab90df3bf0c5305528274c0547ad97f51ba8baf5ad1d8a958de6cdbb5a
-
SSDEEP
24576:eWFOB2FnMVJxMCOkapwtQiXy+NtD9JVNZC+/ucdx6ODMV79Og:+BUYkppKD9DNJ/u+x9DMV7Mg
Static task
static1
Behavioral task
behavioral1
Sample
104ec96259b8117e1efaf9d90ef95b42_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
104ec96259b8117e1efaf9d90ef95b42_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alraedsecurity.com - Port:
587 - Username:
tauseef@alraedsecurity.com - Password:
Alraed99pass@
Targets
-
-
Target
104ec96259b8117e1efaf9d90ef95b42_JaffaCakes118
-
Size
1.0MB
-
MD5
104ec96259b8117e1efaf9d90ef95b42
-
SHA1
d5cdfa7d6ca10c4ecdcebac7a547fa644da8526f
-
SHA256
5f4e08ff55f9130c843fb3251856a8bbf945f615050a51fdc667ca113fb2e867
-
SHA512
84dd2aa685d9648f20f4d8396b767259c480ad52d0d9f8f6ebacd237e10789873c633aab90df3bf0c5305528274c0547ad97f51ba8baf5ad1d8a958de6cdbb5a
-
SSDEEP
24576:eWFOB2FnMVJxMCOkapwtQiXy+NtD9JVNZC+/ucdx6ODMV79Og:+BUYkppKD9DNJ/u+x9DMV7Mg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-