General
-
Target
1891da5d3e931b537c1b9a7fb29582af_JaffaCakes118
-
Size
562KB
-
Sample
240329-e85lasae88
-
MD5
1891da5d3e931b537c1b9a7fb29582af
-
SHA1
b7472085c2e843818d539d2b17a02810f186f7d2
-
SHA256
71546cbaa665d49719f2bc15c29384c188a780a27991fa113cce14081f3ed991
-
SHA512
827935705297764d0b292dc779317052076487b881fb6101cbdba06c683555b5cb053080f99cda26fbd3da020fc4a04fbe79e2be8d4a9c705005a89803948172
-
SSDEEP
12288:S2MsTzWxKpMswVZJ57pfDcP+7vcDV81XJmx4GdKhDeyay7ScE2tpSB:55TzWjzVZX97vcDV89Jm+tYa7S2tEB
Static task
static1
Behavioral task
behavioral1
Sample
1891da5d3e931b537c1b9a7fb29582af_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1891da5d3e931b537c1b9a7fb29582af_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.citechco.net - Port:
587 - Username:
[email protected] - Password:
Webana@321#
Targets
-
-
Target
1891da5d3e931b537c1b9a7fb29582af_JaffaCakes118
-
Size
562KB
-
MD5
1891da5d3e931b537c1b9a7fb29582af
-
SHA1
b7472085c2e843818d539d2b17a02810f186f7d2
-
SHA256
71546cbaa665d49719f2bc15c29384c188a780a27991fa113cce14081f3ed991
-
SHA512
827935705297764d0b292dc779317052076487b881fb6101cbdba06c683555b5cb053080f99cda26fbd3da020fc4a04fbe79e2be8d4a9c705005a89803948172
-
SSDEEP
12288:S2MsTzWxKpMswVZJ57pfDcP+7vcDV81XJmx4GdKhDeyay7ScE2tpSB:55TzWjzVZX97vcDV89Jm+tYa7S2tEB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-