General
-
Target
192d67b731c7d2370090756d8dcb4bbb_JaffaCakes118
-
Size
572KB
-
Sample
240329-fq99haad3y
-
MD5
192d67b731c7d2370090756d8dcb4bbb
-
SHA1
9e97c8eef2825c76ea08e8e1aa688a986f9956b7
-
SHA256
3271a56a5c379b0847b0217c9dc4818fbdbc0be5cc344a02fed9c0a3f138fad6
-
SHA512
0cf50bf69fb58cdcc5d5d4d04a19bfaaa876c01a5eb1257cc3fbfd3b345518f30e276142fa6f09fc5c2955720467dba7d290d30b7e29954396b38529e57eadaa
-
SSDEEP
12288:hYMELML0BdWp2qKa+mqvu8FjYIPFIc5ySB:yVML0rWprXmu8WIPFzB
Static task
static1
Behavioral task
behavioral1
Sample
192d67b731c7d2370090756d8dcb4bbb_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
192d67b731c7d2370090756d8dcb4bbb_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
[email protected] - Password:
Davidchukwuka2016
Targets
-
-
Target
192d67b731c7d2370090756d8dcb4bbb_JaffaCakes118
-
Size
572KB
-
MD5
192d67b731c7d2370090756d8dcb4bbb
-
SHA1
9e97c8eef2825c76ea08e8e1aa688a986f9956b7
-
SHA256
3271a56a5c379b0847b0217c9dc4818fbdbc0be5cc344a02fed9c0a3f138fad6
-
SHA512
0cf50bf69fb58cdcc5d5d4d04a19bfaaa876c01a5eb1257cc3fbfd3b345518f30e276142fa6f09fc5c2955720467dba7d290d30b7e29954396b38529e57eadaa
-
SSDEEP
12288:hYMELML0BdWp2qKa+mqvu8FjYIPFIc5ySB:yVML0rWprXmu8WIPFzB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-