General
-
Target
1686f2ca568d14d7f2b177ee1c743f60_JaffaCakes118
-
Size
630KB
-
Sample
240329-daweasgc82
-
MD5
1686f2ca568d14d7f2b177ee1c743f60
-
SHA1
dfa94bbe835439beabe8ba7ca6d90712326dc087
-
SHA256
05039e971b768e532edfa8777a5d3008c31d0a48daa9f143c99f5958e9006b00
-
SHA512
1e85eea1ba35068fbb107ec6d588a972d9c10095a170148c404b276972e7ae239e527cda7dad8fadb21812cf428fd6eb1fcb4fe5fee3550f311291a3b4b3ea08
-
SSDEEP
12288:Il4mUf/JE8lFtoPT1+dsQGVW6GH0KAhv:FmUft2PT1+dsQlJ6
Static task
static1
Behavioral task
behavioral1
Sample
1686f2ca568d14d7f2b177ee1c743f60_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1686f2ca568d14d7f2b177ee1c743f60_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Rollingstone147
Targets
-
-
Target
1686f2ca568d14d7f2b177ee1c743f60_JaffaCakes118
-
Size
630KB
-
MD5
1686f2ca568d14d7f2b177ee1c743f60
-
SHA1
dfa94bbe835439beabe8ba7ca6d90712326dc087
-
SHA256
05039e971b768e532edfa8777a5d3008c31d0a48daa9f143c99f5958e9006b00
-
SHA512
1e85eea1ba35068fbb107ec6d588a972d9c10095a170148c404b276972e7ae239e527cda7dad8fadb21812cf428fd6eb1fcb4fe5fee3550f311291a3b4b3ea08
-
SSDEEP
12288:Il4mUf/JE8lFtoPT1+dsQGVW6GH0KAhv:FmUft2PT1+dsQlJ6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-