General
-
Target
8a2a164482a0142728ab3bbd4559d686_JaffaCakes118
-
Size
721KB
-
Sample
240601-mdbnqshg6z
-
MD5
8a2a164482a0142728ab3bbd4559d686
-
SHA1
9db2bbe3fc8a10fd9b5a3c48c8e540c743a1c1f9
-
SHA256
7693781ca53fb17f4639ca60041799d2efb919301109f65caa16a41e2f96c43a
-
SHA512
aed8a6978aa3e263d59f2f1e6ba558b5bc238125cbfd602bfca79efd1350943dfceba3a6b9a4c14155a5b923d57009186a7a3f8896e1606bd6f9df3f39c9b4cd
-
SSDEEP
12288:XcFUncJ54irus265GoqlDX1YH0COI+w7Ror6PpGg+l2K3RYUOsSeysBF4vf9uQ7j:dnYnuRcBIoGblBhP7hF+f9Zn
Static task
static1
Behavioral task
behavioral1
Sample
8a2a164482a0142728ab3bbd4559d686_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a2a164482a0142728ab3bbd4559d686_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Kingdom12345
Targets
-
-
Target
8a2a164482a0142728ab3bbd4559d686_JaffaCakes118
-
Size
721KB
-
MD5
8a2a164482a0142728ab3bbd4559d686
-
SHA1
9db2bbe3fc8a10fd9b5a3c48c8e540c743a1c1f9
-
SHA256
7693781ca53fb17f4639ca60041799d2efb919301109f65caa16a41e2f96c43a
-
SHA512
aed8a6978aa3e263d59f2f1e6ba558b5bc238125cbfd602bfca79efd1350943dfceba3a6b9a4c14155a5b923d57009186a7a3f8896e1606bd6f9df3f39c9b4cd
-
SSDEEP
12288:XcFUncJ54irus265GoqlDX1YH0COI+w7Ror6PpGg+l2K3RYUOsSeysBF4vf9uQ7j:dnYnuRcBIoGblBhP7hF+f9Zn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-