General
-
Target
1836407a4605fecf877eabf01ab0d84f_JaffaCakes118
-
Size
550KB
-
Sample
240329-ex6n8ahf21
-
MD5
1836407a4605fecf877eabf01ab0d84f
-
SHA1
8e006502062531567776e6315a031eac91c7a2f2
-
SHA256
da329fd60cb3519d400f3ba48692d3a3d79864dfeb51a43db56b6d12982cd3cb
-
SHA512
01751f101343e3b060023052cd7aad557739ada3cd00685b5dda6735676772c3d6c0de0414b0589050f5e4a0a89ceeb23217b2fd558ad196b57e7a31a6de6b91
-
SSDEEP
12288:2wyV1lzekhtihXIQi+5S046lrRp5W7IF+90RHXYpJSB:lyV/eoK/5DNH5W7IFqAVB
Static task
static1
Behavioral task
behavioral1
Sample
1836407a4605fecf877eabf01ab0d84f_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1836407a4605fecf877eabf01ab0d84f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
e)cnIdR1
Targets
-
-
Target
1836407a4605fecf877eabf01ab0d84f_JaffaCakes118
-
Size
550KB
-
MD5
1836407a4605fecf877eabf01ab0d84f
-
SHA1
8e006502062531567776e6315a031eac91c7a2f2
-
SHA256
da329fd60cb3519d400f3ba48692d3a3d79864dfeb51a43db56b6d12982cd3cb
-
SHA512
01751f101343e3b060023052cd7aad557739ada3cd00685b5dda6735676772c3d6c0de0414b0589050f5e4a0a89ceeb23217b2fd558ad196b57e7a31a6de6b91
-
SSDEEP
12288:2wyV1lzekhtihXIQi+5S046lrRp5W7IF+90RHXYpJSB:lyV/eoK/5DNH5W7IFqAVB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-