General
-
Target
2eb311f782cc74045ab059afed12e6c6_JaffaCakes118
-
Size
534KB
-
Sample
240329-3tfwdsda58
-
MD5
2eb311f782cc74045ab059afed12e6c6
-
SHA1
16774fbdeee1609424b7f89fd8700839aae096dc
-
SHA256
316bfa32be249c34cb0c9c8d04eb9dda58255f1aea09e9fa7cf45fee0fc6c2d9
-
SHA512
fab24e66e235e48d0bb1804d19661981fb18b2d38e6a8937c98d7a00709a7365bf8149f8b0646fdf72118042f14c2dfdf54d41696f3068ea2a76ddabf7cc2012
-
SSDEEP
12288:XefxQNjTSjT7vlnU9ZeOLFDpnNcdO8Ggc1CU1z6QoIwyHiq1uruLKqHI0htDA+ta:XuRq+Dwp3HesYzal+ReVq
Static task
static1
Behavioral task
behavioral1
Sample
2eb311f782cc74045ab059afed12e6c6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2eb311f782cc74045ab059afed12e6c6_JaffaCakes118.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.comansi.com - Port:
587 - Username:
[email protected] - Password:
JUGuete$2021 - Email To:
[email protected]
Targets
-
-
Target
2eb311f782cc74045ab059afed12e6c6_JaffaCakes118
-
Size
534KB
-
MD5
2eb311f782cc74045ab059afed12e6c6
-
SHA1
16774fbdeee1609424b7f89fd8700839aae096dc
-
SHA256
316bfa32be249c34cb0c9c8d04eb9dda58255f1aea09e9fa7cf45fee0fc6c2d9
-
SHA512
fab24e66e235e48d0bb1804d19661981fb18b2d38e6a8937c98d7a00709a7365bf8149f8b0646fdf72118042f14c2dfdf54d41696f3068ea2a76ddabf7cc2012
-
SSDEEP
12288:XefxQNjTSjT7vlnU9ZeOLFDpnNcdO8Ggc1CU1z6QoIwyHiq1uruLKqHI0htDA+ta:XuRq+Dwp3HesYzal+ReVq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-