General
-
Target
c0f0ad839576a174072d3fdb657159a1_JaffaCakes118
-
Size
691KB
-
Sample
240404-ybllpsgc6z
-
MD5
c0f0ad839576a174072d3fdb657159a1
-
SHA1
c06460aa2a5470e615e632bc2df62f54a969c53f
-
SHA256
c02e6e6559c85349d2be3c931b387092ef50b3a33197614e441135e3284059ed
-
SHA512
9a8aba1558f0fd3a64893258e710bac1820e82f119d33d165f7b10ad738f7dfca3b533ea7aecaa98581b2af610a69b72a57d7cf1d84418d9c5b79aa82b1d0865
-
SSDEEP
12288:Lhv05rdERQin/L/yrxnuOb/wICNnsEp2CYW6B4lHk0:Vkr+uBQICNn/4BUm
Static task
static1
Behavioral task
behavioral1
Sample
c0f0ad839576a174072d3fdb657159a1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0f0ad839576a174072d3fdb657159a1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rapidmail.ec - Port:
587 - Username:
[email protected] - Password:
icui4cu2@@ - Email To:
[email protected]
Targets
-
-
Target
c0f0ad839576a174072d3fdb657159a1_JaffaCakes118
-
Size
691KB
-
MD5
c0f0ad839576a174072d3fdb657159a1
-
SHA1
c06460aa2a5470e615e632bc2df62f54a969c53f
-
SHA256
c02e6e6559c85349d2be3c931b387092ef50b3a33197614e441135e3284059ed
-
SHA512
9a8aba1558f0fd3a64893258e710bac1820e82f119d33d165f7b10ad738f7dfca3b533ea7aecaa98581b2af610a69b72a57d7cf1d84418d9c5b79aa82b1d0865
-
SSDEEP
12288:Lhv05rdERQin/L/yrxnuOb/wICNnsEp2CYW6B4lHk0:Vkr+uBQICNn/4BUm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-