General
-
Target
27cf061bac2b26e7178d03a28746e429_JaffaCakes118
-
Size
565KB
-
Sample
240329-vnx9gsdg59
-
MD5
27cf061bac2b26e7178d03a28746e429
-
SHA1
0953d2fcae7c8566d62bc7d25126aed88d79d2af
-
SHA256
2960124a60f0c901bff1af04056a9f76a9d23025317a499cfb936a6019c84aa0
-
SHA512
7de3c5433fb8688fc0565202e3c7c32a4e5e27fe65543386b4d35c21afac845ea5b8281f00446c7e7b27105ea08bb7204d365029d4c550bcf0604fed23bdbd9f
-
SSDEEP
12288:OIMQSBjfZwWpKGSKKQLYVA7PTziCHgQCH3NQVuqhSf:LOBjRdkGSKTt7beECH3Inh
Static task
static1
Behavioral task
behavioral1
Sample
27cf061bac2b26e7178d03a28746e429_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27cf061bac2b26e7178d03a28746e429_JaffaCakes118.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
e)cnIdR1
Targets
-
-
Target
27cf061bac2b26e7178d03a28746e429_JaffaCakes118
-
Size
565KB
-
MD5
27cf061bac2b26e7178d03a28746e429
-
SHA1
0953d2fcae7c8566d62bc7d25126aed88d79d2af
-
SHA256
2960124a60f0c901bff1af04056a9f76a9d23025317a499cfb936a6019c84aa0
-
SHA512
7de3c5433fb8688fc0565202e3c7c32a4e5e27fe65543386b4d35c21afac845ea5b8281f00446c7e7b27105ea08bb7204d365029d4c550bcf0604fed23bdbd9f
-
SSDEEP
12288:OIMQSBjfZwWpKGSKKQLYVA7PTziCHgQCH3NQVuqhSf:LOBjRdkGSKTt7beECH3Inh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-