General
-
Target
3fa704055adc942da4b007babceeffbc_JaffaCakes118
-
Size
399KB
-
Sample
240330-t1q59shg21
-
MD5
3fa704055adc942da4b007babceeffbc
-
SHA1
9505a1601f65f227167aafee101c1dd042e8d3eb
-
SHA256
252000fc9c9a045eaf95df97586560bdd0c54dccb2de64fe2197d0a4b4069b0b
-
SHA512
8ebf40c90f7c853a4c5ccc68becf50ff31ff4188188c08066810ff1d0ed063c6cc6f5223982ca0f277ee9450b49405d65dfe593ef32653fa1b184b1d3d024601
-
SSDEEP
12288:8gSB31kgvUjSkSMm4BrxhLGEdylu5BqdlIxH:gB3GgcjSCm4pxceUufMl
Static task
static1
Behavioral task
behavioral1
Sample
3fa704055adc942da4b007babceeffbc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3fa704055adc942da4b007babceeffbc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lahaciendamontericogrande.com.pe - Port:
587 - Username:
[email protected] - Password:
e$$
Targets
-
-
Target
3fa704055adc942da4b007babceeffbc_JaffaCakes118
-
Size
399KB
-
MD5
3fa704055adc942da4b007babceeffbc
-
SHA1
9505a1601f65f227167aafee101c1dd042e8d3eb
-
SHA256
252000fc9c9a045eaf95df97586560bdd0c54dccb2de64fe2197d0a4b4069b0b
-
SHA512
8ebf40c90f7c853a4c5ccc68becf50ff31ff4188188c08066810ff1d0ed063c6cc6f5223982ca0f277ee9450b49405d65dfe593ef32653fa1b184b1d3d024601
-
SSDEEP
12288:8gSB31kgvUjSkSMm4BrxhLGEdylu5BqdlIxH:gB3GgcjSCm4pxceUufMl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-