General
-
Target
5baf7601ec7eb5a300f100e290a7d153_JaffaCakes118
-
Size
501KB
-
Sample
240519-1ttfdaca8s
-
MD5
5baf7601ec7eb5a300f100e290a7d153
-
SHA1
b9f3a86ea1f05ceb1cd56aa9f2717080394685ab
-
SHA256
b09df31ac193a42a150b38f437e20feedc150a673fc5107bf4326064e7621ce1
-
SHA512
fdb74691bd59b3cf7a565f4ffcd27e49886fec56396c6c7a67d8e02f09272e13c72401fa8f55b989352eedf0175a3a832f19c75774efca4512b48915b31a96c7
-
SSDEEP
6144:QhJZj3XBjlkq27zgxRQNC3C/HXheIRMaDcTEDQcZsXJt6zUG0+htWOEEFeF6G++P:IzZo7cvNqXwTIH0c66zUG0+WOjd+
Static task
static1
Behavioral task
behavioral1
Sample
5baf7601ec7eb5a300f100e290a7d153_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5baf7601ec7eb5a300f100e290a7d153_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.dveshop.ro/ - Port:
21 - Username:
[email protected] - Password:
;0E4xWb(lC*Z
Protocol: ftp- Host:
ftp://ftp.dveshop.ro/ - Port:
21 - Username:
[email protected] - Password:
;0E4xWb(lC*Z
Targets
-
-
Target
5baf7601ec7eb5a300f100e290a7d153_JaffaCakes118
-
Size
501KB
-
MD5
5baf7601ec7eb5a300f100e290a7d153
-
SHA1
b9f3a86ea1f05ceb1cd56aa9f2717080394685ab
-
SHA256
b09df31ac193a42a150b38f437e20feedc150a673fc5107bf4326064e7621ce1
-
SHA512
fdb74691bd59b3cf7a565f4ffcd27e49886fec56396c6c7a67d8e02f09272e13c72401fa8f55b989352eedf0175a3a832f19c75774efca4512b48915b31a96c7
-
SSDEEP
6144:QhJZj3XBjlkq27zgxRQNC3C/HXheIRMaDcTEDQcZsXJt6zUG0+htWOEEFeF6G++P:IzZo7cvNqXwTIH0c66zUG0+WOjd+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-