General
-
Target
f9f0c253c5fb23f5e38ead5d85bd93ed_JaffaCakes118
-
Size
1.4MB
-
Sample
240419-kqcqfsdb72
-
MD5
f9f0c253c5fb23f5e38ead5d85bd93ed
-
SHA1
8f47664c51fdb281ae53bb1832b080ffdeabe06f
-
SHA256
bbb0d4b90eca36459007965aa8c1609105775769fc73c7eb8f54a7829017297f
-
SHA512
3040cde654a90c7771b2600110c11db6ba823c01385932ed5b262317b5ed699d6ec312d713a76226c15173833748389cd584d4e0addb8746c56fe38c416fe64c
-
SSDEEP
24576:J7QCTfNcRfx8DgMfx8Dgoiv/nwyKqTcxfQ9REiscZCSLL:FfCR58DgM58DgcyKqmfQwOZC2
Static task
static1
Behavioral task
behavioral1
Sample
f9f0c253c5fb23f5e38ead5d85bd93ed_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9f0c253c5fb23f5e38ead5d85bd93ed_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.3aglobalengg.com - Port:
587 - Username:
[email protected] - Password:
admin@2022
Targets
-
-
Target
f9f0c253c5fb23f5e38ead5d85bd93ed_JaffaCakes118
-
Size
1.4MB
-
MD5
f9f0c253c5fb23f5e38ead5d85bd93ed
-
SHA1
8f47664c51fdb281ae53bb1832b080ffdeabe06f
-
SHA256
bbb0d4b90eca36459007965aa8c1609105775769fc73c7eb8f54a7829017297f
-
SHA512
3040cde654a90c7771b2600110c11db6ba823c01385932ed5b262317b5ed699d6ec312d713a76226c15173833748389cd584d4e0addb8746c56fe38c416fe64c
-
SSDEEP
24576:J7QCTfNcRfx8DgMfx8Dgoiv/nwyKqTcxfQ9REiscZCSLL:FfCR58DgM58DgcyKqmfQwOZC2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-