General
-
Target
1d4cd528f28caed7af200d3e9dec8c77_JaffaCakes118
-
Size
1.1MB
-
Sample
240329-kbhm6adh63
-
MD5
1d4cd528f28caed7af200d3e9dec8c77
-
SHA1
4c6f45b6ea2db49d527a59125a77d6f2c6f3449b
-
SHA256
1f00546f3179546bedf70b587ca495c763e3987e426b0a2ef69c707b29144209
-
SHA512
02bedf550773630c0ef522a69df2eb451255a79cc94ef5fc0524929a548790e6f696440807534e2266377939a92759c7610c8bbe9ffab3afcd3c642f0dc97fd4
-
SSDEEP
12288:9WoQMcnMPldjwaisqr9M41ElTdbxZs8wW56tKB3pgVygU:9tDPTjwa1qW4elSpeN3pgVU
Static task
static1
Behavioral task
behavioral1
Sample
1d4cd528f28caed7af200d3e9dec8c77_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d4cd528f28caed7af200d3e9dec8c77_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.enerzi.co - Port:
587 - Username:
[email protected] - Password:
Enerzis@123!#
Targets
-
-
Target
1d4cd528f28caed7af200d3e9dec8c77_JaffaCakes118
-
Size
1.1MB
-
MD5
1d4cd528f28caed7af200d3e9dec8c77
-
SHA1
4c6f45b6ea2db49d527a59125a77d6f2c6f3449b
-
SHA256
1f00546f3179546bedf70b587ca495c763e3987e426b0a2ef69c707b29144209
-
SHA512
02bedf550773630c0ef522a69df2eb451255a79cc94ef5fc0524929a548790e6f696440807534e2266377939a92759c7610c8bbe9ffab3afcd3c642f0dc97fd4
-
SSDEEP
12288:9WoQMcnMPldjwaisqr9M41ElTdbxZs8wW56tKB3pgVygU:9tDPTjwa1qW4elSpeN3pgVU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-