General
-
Target
2dd6c77ef9ba1c9a0083c77d5ad03f77_JaffaCakes118
-
Size
433KB
-
Sample
240329-1wcweabf49
-
MD5
2dd6c77ef9ba1c9a0083c77d5ad03f77
-
SHA1
45704b538c8a90224bd5be7348b4f0069838a445
-
SHA256
7fcf79d8833bf96249a0a445bfd98a172fb45fbc64815d210d30699cc65c7413
-
SHA512
a4900669ba230be7ddb13e3a98915d883cb44774160f87632834b6d2684c44735daa460891906c2674b2538fdb606051a7dc43734331e296fd66899a8b49836d
-
SSDEEP
6144:OJRezouwEzipT3t/nJ0wMfZrLY6YnRn6xRgT3KRZIzWrZxyvwtM7lLR99gsbBT3Y:ZzCd0w8enFTVwCwtM7RR9aa+
Static task
static1
Behavioral task
behavioral1
Sample
2dd6c77ef9ba1c9a0083c77d5ad03f77_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2dd6c77ef9ba1c9a0083c77d5ad03f77_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
baorhihusmusqbnx
Targets
-
-
Target
2dd6c77ef9ba1c9a0083c77d5ad03f77_JaffaCakes118
-
Size
433KB
-
MD5
2dd6c77ef9ba1c9a0083c77d5ad03f77
-
SHA1
45704b538c8a90224bd5be7348b4f0069838a445
-
SHA256
7fcf79d8833bf96249a0a445bfd98a172fb45fbc64815d210d30699cc65c7413
-
SHA512
a4900669ba230be7ddb13e3a98915d883cb44774160f87632834b6d2684c44735daa460891906c2674b2538fdb606051a7dc43734331e296fd66899a8b49836d
-
SSDEEP
6144:OJRezouwEzipT3t/nJ0wMfZrLY6YnRn6xRgT3KRZIzWrZxyvwtM7lLR99gsbBT3Y:ZzCd0w8enFTVwCwtM7RR9aa+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-