General
-
Target
6bf725517cae8667409c5b539cd7caa4_JaffaCakes118
-
Size
400KB
-
Sample
240523-xqteescf71
-
MD5
6bf725517cae8667409c5b539cd7caa4
-
SHA1
92a01c0d9056b3859bd722bdcfac687a849d2c6b
-
SHA256
6f3662d95219580e6b62a2db3e0a255f3111fe12c668b5695450e50b910089f7
-
SHA512
9599f6fe39659943787d8eb5e056bccd2e6c423d0378c6b32cca5c8f4e1e9925ad00b873e34e3c37efec5d952a1f72e2e9b4696cff3f6009c7069dbe666f5420
-
SSDEEP
6144:KJZj3XBjlkq27zgxRbWvW6Fy0s4kplyDyMOWTXTLktN:OzZo7cvb8ZA0BrDyMOKTA
Static task
static1
Behavioral task
behavioral1
Sample
6bf725517cae8667409c5b539cd7caa4_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6bf725517cae8667409c5b539cd7caa4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.emilaina.com - Port:
587 - Username:
[email protected] - Password:
#Q1hNgro%i#0
Targets
-
-
Target
6bf725517cae8667409c5b539cd7caa4_JaffaCakes118
-
Size
400KB
-
MD5
6bf725517cae8667409c5b539cd7caa4
-
SHA1
92a01c0d9056b3859bd722bdcfac687a849d2c6b
-
SHA256
6f3662d95219580e6b62a2db3e0a255f3111fe12c668b5695450e50b910089f7
-
SHA512
9599f6fe39659943787d8eb5e056bccd2e6c423d0378c6b32cca5c8f4e1e9925ad00b873e34e3c37efec5d952a1f72e2e9b4696cff3f6009c7069dbe666f5420
-
SSDEEP
6144:KJZj3XBjlkq27zgxRbWvW6Fy0s4kplyDyMOWTXTLktN:OzZo7cvb8ZA0BrDyMOKTA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-