General
-
Target
3cf3879abacb4672e4a3513c116f78f7_JaffaCakes118
-
Size
1.3MB
-
Sample
240330-qs1g7aff2z
-
MD5
3cf3879abacb4672e4a3513c116f78f7
-
SHA1
6c6d1a50c4d6b462e4cb7abccfcc9ce6e6448b1b
-
SHA256
1fc4afb1872f72003a2a19a1ed5b4de001fe9dc1b3faaf84aad314cc6bc01f50
-
SHA512
5af92d80b5fbbfe7202b81a56cbbe81bf510238cc4f6fcf433796c728450abe37c2f4a6095de6a77531a41e4cd016c77a84af8d9bcb271bdb3c8d9bab0e5ff62
-
SSDEEP
12288:wVD6KN0eq6efBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7ZLxWePfU+S9mDBy832:wV+ueklI5PfU+S9mtJn+T3b
Static task
static1
Behavioral task
behavioral1
Sample
3cf3879abacb4672e4a3513c116f78f7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3cf3879abacb4672e4a3513c116f78f7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.enerzi.co - Port:
587 - Username:
[email protected] - Password:
Enerzis@123!#
Targets
-
-
Target
3cf3879abacb4672e4a3513c116f78f7_JaffaCakes118
-
Size
1.3MB
-
MD5
3cf3879abacb4672e4a3513c116f78f7
-
SHA1
6c6d1a50c4d6b462e4cb7abccfcc9ce6e6448b1b
-
SHA256
1fc4afb1872f72003a2a19a1ed5b4de001fe9dc1b3faaf84aad314cc6bc01f50
-
SHA512
5af92d80b5fbbfe7202b81a56cbbe81bf510238cc4f6fcf433796c728450abe37c2f4a6095de6a77531a41e4cd016c77a84af8d9bcb271bdb3c8d9bab0e5ff62
-
SSDEEP
12288:wVD6KN0eq6efBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7ZLxWePfU+S9mDBy832:wV+ueklI5PfU+S9mtJn+T3b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-