General
-
Target
995f49454cab4d1a79a73620a454a191_JaffaCakes118
-
Size
1.4MB
-
Sample
240605-11ldcabd56
-
MD5
995f49454cab4d1a79a73620a454a191
-
SHA1
fab9bb3b3d54b5b5fd2dda76469c00820d510439
-
SHA256
42a79ea60f01d619dd9886f6e37745bfd8783a6c85bcab51b76ee3e2c8e4a26c
-
SHA512
e7e6f74c38b086afcc823349dbedc4af7c28da00fe966fc7d049705cb86877aeca7e51c657bd7b9f97e5dd1132341c4d09190348b0d67374b9f59e1cbdb559a4
-
SSDEEP
24576:5PxMfmw1AXiS0rMaqERwrH4wOVfa+vUe/I7YcMUigeVPNDo7zjdrGTjjefU:QRai1vfC0phQ7YcMUigeVlDAzpregU
Static task
static1
Behavioral task
behavioral1
Sample
995f49454cab4d1a79a73620a454a191_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
995f49454cab4d1a79a73620a454a191_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dogulumetal.com - Port:
587 - Username:
[email protected] - Password:
DMaslak2950**
Targets
-
-
Target
995f49454cab4d1a79a73620a454a191_JaffaCakes118
-
Size
1.4MB
-
MD5
995f49454cab4d1a79a73620a454a191
-
SHA1
fab9bb3b3d54b5b5fd2dda76469c00820d510439
-
SHA256
42a79ea60f01d619dd9886f6e37745bfd8783a6c85bcab51b76ee3e2c8e4a26c
-
SHA512
e7e6f74c38b086afcc823349dbedc4af7c28da00fe966fc7d049705cb86877aeca7e51c657bd7b9f97e5dd1132341c4d09190348b0d67374b9f59e1cbdb559a4
-
SSDEEP
24576:5PxMfmw1AXiS0rMaqERwrH4wOVfa+vUe/I7YcMUigeVPNDo7zjdrGTjjefU:QRai1vfC0phQ7YcMUigeVlDAzpregU
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-