General
-
Target
647b63c7412724be299a54f055a7ac0e_JaffaCakes118
-
Size
534KB
-
Sample
240521-x6ax1sfh69
-
MD5
647b63c7412724be299a54f055a7ac0e
-
SHA1
d57702128a1767dc7440cf503a691fd94be6bc06
-
SHA256
8e2cf8c9a6ea55908c4294c8a8dc129600d79a19356d14014db6e851759c11a4
-
SHA512
8bca891764eba939e77085ad0d370155687352b0057fbf8cbf7cc8ac769073b7fc064f1330b1145325bbd725d5f339d1718227b7f56673c387cfb5b21acebac1
-
SSDEEP
12288:ZlIqjP6eP9BF0PsbQlSxJ3uPDpT/18xy4TSa4:THjP6+B7QIx4DpT/18xjSa4
Static task
static1
Behavioral task
behavioral1
Sample
647b63c7412724be299a54f055a7ac0e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
647b63c7412724be299a54f055a7ac0e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
villa369@@
Targets
-
-
Target
647b63c7412724be299a54f055a7ac0e_JaffaCakes118
-
Size
534KB
-
MD5
647b63c7412724be299a54f055a7ac0e
-
SHA1
d57702128a1767dc7440cf503a691fd94be6bc06
-
SHA256
8e2cf8c9a6ea55908c4294c8a8dc129600d79a19356d14014db6e851759c11a4
-
SHA512
8bca891764eba939e77085ad0d370155687352b0057fbf8cbf7cc8ac769073b7fc064f1330b1145325bbd725d5f339d1718227b7f56673c387cfb5b21acebac1
-
SSDEEP
12288:ZlIqjP6eP9BF0PsbQlSxJ3uPDpT/18xy4TSa4:THjP6+B7QIx4DpT/18xjSa4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-