General
-
Target
fe3ed7479a5aa704361999175c03f5b0_JaffaCakes118
-
Size
729KB
-
Sample
240421-c7dp3shc3v
-
MD5
fe3ed7479a5aa704361999175c03f5b0
-
SHA1
a9b1c9c780e6a8bed0c2410c7280d4ac0aa8ea40
-
SHA256
3f5c564604f35defce8860339fccfc62c63338ff8b1283473294b0f7fe9ac84e
-
SHA512
b1489eb1c53c927b92653165ccc04b43baa4e44b7f71a6e2825fc3e3e0507b28d753ed7cad95ee14e6c8f157d8dc8176a0455198f71d3679837a91c439de0656
-
SSDEEP
12288:ANICRHTzbM9yHLnXGSq2p9l4vi14v0Lzh5ckjxOgOsnxOUymHQ86sEqUJHawKTF:6EknXGuD4viE0L9aSxNOmxOUymwMG
Static task
static1
Behavioral task
behavioral1
Sample
fe3ed7479a5aa704361999175c03f5b0_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fe3ed7479a5aa704361999175c03f5b0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.efeforklift.com.tr - Port:
587 - Username:
[email protected] - Password:
Aminem11* - Email To:
[email protected]
Targets
-
-
Target
fe3ed7479a5aa704361999175c03f5b0_JaffaCakes118
-
Size
729KB
-
MD5
fe3ed7479a5aa704361999175c03f5b0
-
SHA1
a9b1c9c780e6a8bed0c2410c7280d4ac0aa8ea40
-
SHA256
3f5c564604f35defce8860339fccfc62c63338ff8b1283473294b0f7fe9ac84e
-
SHA512
b1489eb1c53c927b92653165ccc04b43baa4e44b7f71a6e2825fc3e3e0507b28d753ed7cad95ee14e6c8f157d8dc8176a0455198f71d3679837a91c439de0656
-
SSDEEP
12288:ANICRHTzbM9yHLnXGSq2p9l4vi14v0Lzh5ckjxOgOsnxOUymHQ86sEqUJHawKTF:6EknXGuD4viE0L9aSxNOmxOUymwMG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-