General
-
Target
2f957aff9ecd8455aa2d692b0a0b01ce_JaffaCakes118
-
Size
717KB
-
Sample
240330-a3arhsdb5t
-
MD5
2f957aff9ecd8455aa2d692b0a0b01ce
-
SHA1
7901d2c9d85b16f171704aff1cede78aac687515
-
SHA256
f8109963334e58c28b2f9aafb3a98331929df0d1834dd4d1e84ac34e5327dd05
-
SHA512
32b443f9842f705fae89d67d25f1b2e737f0e24ba6be34349881d60379fbbd9733c2b898b9e988699135b9077299eeb403fb90162ae089908aa14df5079df59b
-
SSDEEP
12288:qzhvOUi0OwBH+sb1PdQHZA/8NCZ6fu1+PNmK7K7pLMf:qt2Uis+g1PCrfFNmpZMf
Static task
static1
Behavioral task
behavioral1
Sample
2f957aff9ecd8455aa2d692b0a0b01ce_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f957aff9ecd8455aa2d692b0a0b01ce_JaffaCakes118.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
e)cnIdR1
Targets
-
-
Target
2f957aff9ecd8455aa2d692b0a0b01ce_JaffaCakes118
-
Size
717KB
-
MD5
2f957aff9ecd8455aa2d692b0a0b01ce
-
SHA1
7901d2c9d85b16f171704aff1cede78aac687515
-
SHA256
f8109963334e58c28b2f9aafb3a98331929df0d1834dd4d1e84ac34e5327dd05
-
SHA512
32b443f9842f705fae89d67d25f1b2e737f0e24ba6be34349881d60379fbbd9733c2b898b9e988699135b9077299eeb403fb90162ae089908aa14df5079df59b
-
SSDEEP
12288:qzhvOUi0OwBH+sb1PdQHZA/8NCZ6fu1+PNmK7K7pLMf:qt2Uis+g1PCrfFNmpZMf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-