General
-
Target
37c89e5d5fcb103c1c8679bc3207fb37_JaffaCakes118
-
Size
604KB
-
Sample
240330-j5zyvscc55
-
MD5
37c89e5d5fcb103c1c8679bc3207fb37
-
SHA1
2075a5aab3e1653a9b93ff7f59974b9260a4f12c
-
SHA256
17b94c53b369665b9816ac41c7b92ecd8d25cea5525960f9d9fdec61302d70b9
-
SHA512
b988a0b6012390d7df7de10ffd057811ff6ce9d0a04176f2085532b9ecfe37cd62a87f91d780b8caeae83548573061e87c69118277cdd40fb659457adc7b5829
-
SSDEEP
12288:lEhv/UO+bmk2aYXqBx7bEF5g5OnfQH59c2/eg0:KnUO+B1jx7bCNnfQrcw
Static task
static1
Behavioral task
behavioral1
Sample
37c89e5d5fcb103c1c8679bc3207fb37_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37c89e5d5fcb103c1c8679bc3207fb37_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.prinutrition.com - Port:
587 - Username:
[email protected] - Password:
forrest
Targets
-
-
Target
37c89e5d5fcb103c1c8679bc3207fb37_JaffaCakes118
-
Size
604KB
-
MD5
37c89e5d5fcb103c1c8679bc3207fb37
-
SHA1
2075a5aab3e1653a9b93ff7f59974b9260a4f12c
-
SHA256
17b94c53b369665b9816ac41c7b92ecd8d25cea5525960f9d9fdec61302d70b9
-
SHA512
b988a0b6012390d7df7de10ffd057811ff6ce9d0a04176f2085532b9ecfe37cd62a87f91d780b8caeae83548573061e87c69118277cdd40fb659457adc7b5829
-
SSDEEP
12288:lEhv/UO+bmk2aYXqBx7bEF5g5OnfQH59c2/eg0:KnUO+B1jx7bCNnfQrcw
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-