General
-
Target
28ff0404e84b92de1d429bc4371b0b46_JaffaCakes118
-
Size
568KB
-
Sample
240329-wmhcbaed3t
-
MD5
28ff0404e84b92de1d429bc4371b0b46
-
SHA1
c7882a606d73af5148b161cd346f41db8520b29d
-
SHA256
7ba3600217b45900a21c6f77ed30c82234c7700bfab1148729ec9fa65f743e64
-
SHA512
ea1e0b0887b4fe0c014b2381310f787bcfd1042dfda76211fdeff975ebfc6edef84232b1347d1cee13773c73850e5cd73bcb6f58dae9c49f0016a52481a06e94
-
SSDEEP
12288:5s/phMhSB6MiRGSuP8LH/pjpNQjyaKtgmGaTEDisTSJVTTpI1K5bm:AjrBaLpuaYLuJ5tI1
Static task
static1
Behavioral task
behavioral1
Sample
28ff0404e84b92de1d429bc4371b0b46_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28ff0404e84b92de1d429bc4371b0b46_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.timsonlogisticske.com - Port:
587 - Username:
[email protected] - Password:
timsam2015
Targets
-
-
Target
28ff0404e84b92de1d429bc4371b0b46_JaffaCakes118
-
Size
568KB
-
MD5
28ff0404e84b92de1d429bc4371b0b46
-
SHA1
c7882a606d73af5148b161cd346f41db8520b29d
-
SHA256
7ba3600217b45900a21c6f77ed30c82234c7700bfab1148729ec9fa65f743e64
-
SHA512
ea1e0b0887b4fe0c014b2381310f787bcfd1042dfda76211fdeff975ebfc6edef84232b1347d1cee13773c73850e5cd73bcb6f58dae9c49f0016a52481a06e94
-
SSDEEP
12288:5s/phMhSB6MiRGSuP8LH/pjpNQjyaKtgmGaTEDisTSJVTTpI1K5bm:AjrBaLpuaYLuJ5tI1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-