General
-
Target
65ea5594ddf4968baa26cc3dddfa0db0_JaffaCakes118
-
Size
1.6MB
-
Sample
240522-efx1rabc39
-
MD5
65ea5594ddf4968baa26cc3dddfa0db0
-
SHA1
a4fab59a1da577bbd4b929d31cdca32279dd0dee
-
SHA256
1334290e2e59bc9e53b20732cd9403a683aadce734ca1c5db4030309b74adae0
-
SHA512
23d29813b2ab79502743aa328f854b83639770f9294540da41dd7ffac000571832c8238c403905ab0978fc39b9154056f7c0550c1dc0d5bb6b6199f82140de9d
-
SSDEEP
49152:Ou0c++OCvkGs9Fa9O/0J7FE8dNWxJ/jBxaq/FDjJY:RB3vkJ9Sq/prdFfJ
Static task
static1
Behavioral task
behavioral1
Sample
65ea5594ddf4968baa26cc3dddfa0db0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65ea5594ddf4968baa26cc3dddfa0db0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.weltwietagri.com - Port:
587 - Username:
[email protected] - Password:
aFoijG*0
Targets
-
-
Target
65ea5594ddf4968baa26cc3dddfa0db0_JaffaCakes118
-
Size
1.6MB
-
MD5
65ea5594ddf4968baa26cc3dddfa0db0
-
SHA1
a4fab59a1da577bbd4b929d31cdca32279dd0dee
-
SHA256
1334290e2e59bc9e53b20732cd9403a683aadce734ca1c5db4030309b74adae0
-
SHA512
23d29813b2ab79502743aa328f854b83639770f9294540da41dd7ffac000571832c8238c403905ab0978fc39b9154056f7c0550c1dc0d5bb6b6199f82140de9d
-
SSDEEP
49152:Ou0c++OCvkGs9Fa9O/0J7FE8dNWxJ/jBxaq/FDjJY:RB3vkJ9Sq/prdFfJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-