General
-
Target
2f4deae5668099f4be4cc7e62fc42af4_JaffaCakes118
-
Size
511KB
-
Sample
240330-at64csdf92
-
MD5
2f4deae5668099f4be4cc7e62fc42af4
-
SHA1
152de3f42abde9fc46c470820ca8a9a77c91ffd7
-
SHA256
466e69c68f7e24ae7a669ba9b9f70dee579d2c52d1d37aa963686576ae428431
-
SHA512
4bd287fe2895427c9258550c22df1c3c0397239bdf162d1710cc977fa68b99b040ca2e7c862ff0ff6333a99adfe8094240fbcbccb1a97ef22667b20b8fecba9d
-
SSDEEP
12288:RSBWJeRAJpKA8VlSTh+u+eLHNB31OXH0THEKHg0R:cBke6JB8S1PBRBYUj/Z
Static task
static1
Behavioral task
behavioral1
Sample
2f4deae5668099f4be4cc7e62fc42af4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f4deae5668099f4be4cc7e62fc42af4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
sayyes123
Targets
-
-
Target
2f4deae5668099f4be4cc7e62fc42af4_JaffaCakes118
-
Size
511KB
-
MD5
2f4deae5668099f4be4cc7e62fc42af4
-
SHA1
152de3f42abde9fc46c470820ca8a9a77c91ffd7
-
SHA256
466e69c68f7e24ae7a669ba9b9f70dee579d2c52d1d37aa963686576ae428431
-
SHA512
4bd287fe2895427c9258550c22df1c3c0397239bdf162d1710cc977fa68b99b040ca2e7c862ff0ff6333a99adfe8094240fbcbccb1a97ef22667b20b8fecba9d
-
SSDEEP
12288:RSBWJeRAJpKA8VlSTh+u+eLHNB31OXH0THEKHg0R:cBke6JB8S1PBRBYUj/Z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-