General
-
Target
225356d52c7ea3aa9720bc47fbcd7493_JaffaCakes118
-
Size
501KB
-
Sample
240329-pyw7aahf25
-
MD5
225356d52c7ea3aa9720bc47fbcd7493
-
SHA1
28795f0cbf10163d1356991258bee5f9b5805436
-
SHA256
34128dd787bc536cba3fecd2f60b0c2a071a5ba06713d7330e567e6d1607ad59
-
SHA512
4c8afc2e0761c28ad426176c09ee93c6222d1b8a89417ec472e67e6019e7e3bf88a71a68226b8c4c7fe3ffb4ca76e5ee8022c8a47e241a7ba44084aa40cc4ce5
-
SSDEEP
12288:1HUGAbUi2iNfuM16KbUYYt14FSnDOnYVOsY:0bUi1xuMMKgYm1mADpb
Static task
static1
Behavioral task
behavioral1
Sample
225356d52c7ea3aa9720bc47fbcd7493_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
225356d52c7ea3aa9720bc47fbcd7493_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
C%)%GWZe9
Targets
-
-
Target
225356d52c7ea3aa9720bc47fbcd7493_JaffaCakes118
-
Size
501KB
-
MD5
225356d52c7ea3aa9720bc47fbcd7493
-
SHA1
28795f0cbf10163d1356991258bee5f9b5805436
-
SHA256
34128dd787bc536cba3fecd2f60b0c2a071a5ba06713d7330e567e6d1607ad59
-
SHA512
4c8afc2e0761c28ad426176c09ee93c6222d1b8a89417ec472e67e6019e7e3bf88a71a68226b8c4c7fe3ffb4ca76e5ee8022c8a47e241a7ba44084aa40cc4ce5
-
SSDEEP
12288:1HUGAbUi2iNfuM16KbUYYt14FSnDOnYVOsY:0bUi1xuMMKgYm1mADpb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-