General
-
Target
f532f904fc285ab5ff001021e0c0c6a9_JaffaCakes118
-
Size
804KB
-
Sample
240417-hcteyahf3z
-
MD5
f532f904fc285ab5ff001021e0c0c6a9
-
SHA1
5818caf928c26d389c487442d39d2b61d0ef8123
-
SHA256
947dd540011582db0097d01cb51f9c779c13f2033e96ef6d76a4b2e6e5b9d6f5
-
SHA512
3833fec8bfebe918f4ba0d36079be8b571bf84cdc08f3780d53432234224fff18d723b3cc74c43701db35f26cc1d3ed9891bf62ea32da865b8356ff132487eec
-
SSDEEP
24576:dnU0QpKYq5Xjmepk/ozfcNe6Rq7zaFJ+kxqZlCjrc:isjm+k/oTcE
Static task
static1
Behavioral task
behavioral1
Sample
f532f904fc285ab5ff001021e0c0c6a9_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f532f904fc285ab5ff001021e0c0c6a9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
sontcehkwhxjwuqj
Targets
-
-
Target
f532f904fc285ab5ff001021e0c0c6a9_JaffaCakes118
-
Size
804KB
-
MD5
f532f904fc285ab5ff001021e0c0c6a9
-
SHA1
5818caf928c26d389c487442d39d2b61d0ef8123
-
SHA256
947dd540011582db0097d01cb51f9c779c13f2033e96ef6d76a4b2e6e5b9d6f5
-
SHA512
3833fec8bfebe918f4ba0d36079be8b571bf84cdc08f3780d53432234224fff18d723b3cc74c43701db35f26cc1d3ed9891bf62ea32da865b8356ff132487eec
-
SSDEEP
24576:dnU0QpKYq5Xjmepk/ozfcNe6Rq7zaFJ+kxqZlCjrc:isjm+k/oTcE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-