General
-
Target
710d878e3a619723cb42dcd9e4ffbdc0_JaffaCakes118
-
Size
592KB
-
Sample
240525-gn9qmagf54
-
MD5
710d878e3a619723cb42dcd9e4ffbdc0
-
SHA1
54527dbdb0b16ddb88030af0b41eb43bbfb9b883
-
SHA256
16519d5d018c13766cad3838bb859e303c0213b3776039c1159793eceb2e282c
-
SHA512
30550a01d4a716b5b6a5a6fae971a813eb125db99729040358dcaea673e8fcb101cd5899a0d102c7a536ce33ed2c6da617d5fd89f3ddaa15cdd7af1cf696bb8f
-
SSDEEP
12288:vJ+N2WqjSFcZbvuUJCRXCqVxLcoYqR6jL/Ix4XoFu:vJWZyvv4R9bHY1I2b
Static task
static1
Behavioral task
behavioral1
Sample
710d878e3a619723cb42dcd9e4ffbdc0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
710d878e3a619723cb42dcd9e4ffbdc0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bosut.mk - Port:
587 - Username:
[email protected] - Password:
0XsKEemhd6EE
Extracted
Protocol: smtp- Host:
mail.bosut.mk - Port:
587 - Username:
[email protected] - Password:
0XsKEemhd6EE
Targets
-
-
Target
710d878e3a619723cb42dcd9e4ffbdc0_JaffaCakes118
-
Size
592KB
-
MD5
710d878e3a619723cb42dcd9e4ffbdc0
-
SHA1
54527dbdb0b16ddb88030af0b41eb43bbfb9b883
-
SHA256
16519d5d018c13766cad3838bb859e303c0213b3776039c1159793eceb2e282c
-
SHA512
30550a01d4a716b5b6a5a6fae971a813eb125db99729040358dcaea673e8fcb101cd5899a0d102c7a536ce33ed2c6da617d5fd89f3ddaa15cdd7af1cf696bb8f
-
SSDEEP
12288:vJ+N2WqjSFcZbvuUJCRXCqVxLcoYqR6jL/Ix4XoFu:vJWZyvv4R9bHY1I2b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-