General
-
Target
f886d4770a4137907ff13dff98485cc1_JaffaCakes118
-
Size
577KB
-
Sample
240418-w7lv8sbe86
-
MD5
f886d4770a4137907ff13dff98485cc1
-
SHA1
bd0df8fe84d1b2e36e690019ab489948d4991895
-
SHA256
183a991d95d66f57bbd4a1afec13dd59fe13a61e1593f8ba29410d978316e101
-
SHA512
47d77f130ffac0e1c250cf3db5a48078760d6770e977dbf55fab01ba8b578d502379e0c2d7251a1c887e01f0d2ca93d84a8cd26b09c9ddc7909e4300c1c728be
-
SSDEEP
12288:qj5hBrIDQeB+Xjq3pNQEw8G2ieX7IRb2Xt9WGyTxy2pGjCPMXO85:qj5HJQNQEwZ2irRqXG9GmMXz
Static task
static1
Behavioral task
behavioral1
Sample
f886d4770a4137907ff13dff98485cc1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f886d4770a4137907ff13dff98485cc1_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aereks.si - Port:
587 - Username:
info@aereks.si - Password:
10Jure03
Targets
-
-
Target
f886d4770a4137907ff13dff98485cc1_JaffaCakes118
-
Size
577KB
-
MD5
f886d4770a4137907ff13dff98485cc1
-
SHA1
bd0df8fe84d1b2e36e690019ab489948d4991895
-
SHA256
183a991d95d66f57bbd4a1afec13dd59fe13a61e1593f8ba29410d978316e101
-
SHA512
47d77f130ffac0e1c250cf3db5a48078760d6770e977dbf55fab01ba8b578d502379e0c2d7251a1c887e01f0d2ca93d84a8cd26b09c9ddc7909e4300c1c728be
-
SSDEEP
12288:qj5hBrIDQeB+Xjq3pNQEw8G2ieX7IRb2Xt9WGyTxy2pGjCPMXO85:qj5HJQNQEwZ2irRqXG9GmMXz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-