General
-
Target
1363b11e2105d3486b2b5e8479c57a12_JaffaCakes118
-
Size
627KB
-
Sample
240329-ad64esch35
-
MD5
1363b11e2105d3486b2b5e8479c57a12
-
SHA1
b9d24a83153aa0af8b1d00214096ddc75d0464e1
-
SHA256
1a2283bb101bc94c20d48d0ad06f11ce6cb7d0ad76e117a4176b71900dd4c6b3
-
SHA512
ac431b6933b6b46e73e958efed679986df80b8b867536908375b36bef259e4521b6488dea91c30ceb1cfd92b0c26a1f5d044ea4d824eff2eaa3280191575765b
-
SSDEEP
12288:6mVMrkaDkW1wpB8faLg2z05c2/3y4hYcCowre+fOPXBDcexQzNkSBx4:WjoWSP/LVy/i4h1hMZfYXB4BzN5Bx4
Static task
static1
Behavioral task
behavioral1
Sample
1363b11e2105d3486b2b5e8479c57a12_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1363b11e2105d3486b2b5e8479c57a12_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg2plcpnl0023.prod.sin2.secureserver.net - Port:
587 - Username:
nbsupports@seshsupports.com - Password:
User@40378
Targets
-
-
Target
1363b11e2105d3486b2b5e8479c57a12_JaffaCakes118
-
Size
627KB
-
MD5
1363b11e2105d3486b2b5e8479c57a12
-
SHA1
b9d24a83153aa0af8b1d00214096ddc75d0464e1
-
SHA256
1a2283bb101bc94c20d48d0ad06f11ce6cb7d0ad76e117a4176b71900dd4c6b3
-
SHA512
ac431b6933b6b46e73e958efed679986df80b8b867536908375b36bef259e4521b6488dea91c30ceb1cfd92b0c26a1f5d044ea4d824eff2eaa3280191575765b
-
SSDEEP
12288:6mVMrkaDkW1wpB8faLg2z05c2/3y4hYcCowre+fOPXBDcexQzNkSBx4:WjoWSP/LVy/i4h1hMZfYXB4BzN5Bx4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-