General
-
Target
17585bed13f87daddd29d5468396c2d6_JaffaCakes118
-
Size
509KB
-
Sample
240329-d5182agg3t
-
MD5
17585bed13f87daddd29d5468396c2d6
-
SHA1
9e55b1ed0ea89c7913e3a3a8c079e4c14c22147c
-
SHA256
d69b2b00cd65cdc4ae25b7ad980e9c02e845065523f353efd6eaca091b943656
-
SHA512
d383926c798f7d8341063d8711d855f51a001dca58a9617a2c7be3cf343851081d8025488a4dfffcfd8773299afab1ecfad3f9873df01b4f46f0e682fb389aad
-
SSDEEP
12288:XhVk4DbF53e0IUFL8IB+4xtbZ9a4x0t+RLBtqddfV9WfCm:H4UDRU+R1tqbfXWfD
Static task
static1
Behavioral task
behavioral1
Sample
17585bed13f87daddd29d5468396c2d6_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
17585bed13f87daddd29d5468396c2d6_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
DEuros#1759
Targets
-
-
Target
17585bed13f87daddd29d5468396c2d6_JaffaCakes118
-
Size
509KB
-
MD5
17585bed13f87daddd29d5468396c2d6
-
SHA1
9e55b1ed0ea89c7913e3a3a8c079e4c14c22147c
-
SHA256
d69b2b00cd65cdc4ae25b7ad980e9c02e845065523f353efd6eaca091b943656
-
SHA512
d383926c798f7d8341063d8711d855f51a001dca58a9617a2c7be3cf343851081d8025488a4dfffcfd8773299afab1ecfad3f9873df01b4f46f0e682fb389aad
-
SSDEEP
12288:XhVk4DbF53e0IUFL8IB+4xtbZ9a4x0t+RLBtqddfV9WfCm:H4UDRU+R1tqbfXWfD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-