General
-
Target
0f99b96d7569977053c317aa457677ac_JaffaCakes118
-
Size
628KB
-
Sample
240328-zk9kkagh84
-
MD5
0f99b96d7569977053c317aa457677ac
-
SHA1
96298513d8dda6613f0bb3d938a7bd43f9405bf8
-
SHA256
c59d312b4ffe90f9d1240f87c7e97162827f5eb014f531f453bb36942fb78f6c
-
SHA512
e7c17a3dd478a71e6e6aafc81f505121ab116c1744ef8733e1adcda3eea9226f5fa8267c143e1f187ac579a8f5b67b25998d0325fad7b3e8ddcc386e81fa99b1
-
SSDEEP
12288:Boo0s4jHufGhvJMI8wpQoexxRot4abyMWKhuUA59rLVZcAiggQX9DIKx0:O7hJ8qjexxqt4xMWKhuPlZcAia9d
Static task
static1
Behavioral task
behavioral1
Sample
0f99b96d7569977053c317aa457677ac_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f99b96d7569977053c317aa457677ac_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.rettberrg.com - Port:
587 - Username:
ebuk@rettberrg.com - Password:
ka*g((D8
Targets
-
-
Target
0f99b96d7569977053c317aa457677ac_JaffaCakes118
-
Size
628KB
-
MD5
0f99b96d7569977053c317aa457677ac
-
SHA1
96298513d8dda6613f0bb3d938a7bd43f9405bf8
-
SHA256
c59d312b4ffe90f9d1240f87c7e97162827f5eb014f531f453bb36942fb78f6c
-
SHA512
e7c17a3dd478a71e6e6aafc81f505121ab116c1744ef8733e1adcda3eea9226f5fa8267c143e1f187ac579a8f5b67b25998d0325fad7b3e8ddcc386e81fa99b1
-
SSDEEP
12288:Boo0s4jHufGhvJMI8wpQoexxRot4abyMWKhuUA59rLVZcAiggQX9DIKx0:O7hJ8qjexxqt4xMWKhuPlZcAia9d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-