General
-
Target
fdc0a5d6d8e2737403a99c8e6d571811_JaffaCakes118
-
Size
1.0MB
-
Sample
240420-11q9labb65
-
MD5
fdc0a5d6d8e2737403a99c8e6d571811
-
SHA1
d42ee30a741ee57d7b4db4cb72e03ac93616f019
-
SHA256
6e551b257be7e07fed234938b8c6eb1c23f3024edcdf692a589372bcb6a27a26
-
SHA512
dcf2623fd6ebbba30676b0154aa5d51afb4a418fb44d17a607cda9ff52f60a4845b01d1d13f4e29a9b598154e694620b7989c7e19868b77b5a14fe85fc9d98b5
-
SSDEEP
12288:vfO9TWEilzB5AFOaT+DtHy8nfcIAPWx2k6YYy6Ft8e26iQ2:vfwTW/tBaJUkIFxN6F/2g2
Static task
static1
Behavioral task
behavioral1
Sample
fdc0a5d6d8e2737403a99c8e6d571811_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdc0a5d6d8e2737403a99c8e6d571811_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.brimaq.com - Port:
587 - Username:
[email protected] - Password:
brimaQ2012 - Email To:
[email protected]
Targets
-
-
Target
fdc0a5d6d8e2737403a99c8e6d571811_JaffaCakes118
-
Size
1.0MB
-
MD5
fdc0a5d6d8e2737403a99c8e6d571811
-
SHA1
d42ee30a741ee57d7b4db4cb72e03ac93616f019
-
SHA256
6e551b257be7e07fed234938b8c6eb1c23f3024edcdf692a589372bcb6a27a26
-
SHA512
dcf2623fd6ebbba30676b0154aa5d51afb4a418fb44d17a607cda9ff52f60a4845b01d1d13f4e29a9b598154e694620b7989c7e19868b77b5a14fe85fc9d98b5
-
SSDEEP
12288:vfO9TWEilzB5AFOaT+DtHy8nfcIAPWx2k6YYy6Ft8e26iQ2:vfwTW/tBaJUkIFxN6F/2g2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-