General
-
Target
b31a6798b0ff3238addb874bf8eb7950_JaffaCakes118
-
Size
1.1MB
-
Sample
240616-mtnm8sthkj
-
MD5
b31a6798b0ff3238addb874bf8eb7950
-
SHA1
11df2edaafcf514782933dfe5d49a26436069028
-
SHA256
d49cc06b3345c9e1ef413d9ed3c3d24e0ca4ed591b9675a60d3682c137aa4506
-
SHA512
110f725fd5bc63db2caae4779a48b1d3bff6696790f5d901330ebca7f96dfb7f9d9b403123d944b23fb9306e5199b51254abbcfa435263b11b914e23b39a4f3e
-
SSDEEP
12288:3G+PP46BWuOl82dbAIxv3c6oHG3pfTwMGnDheeM7YN43ixIzFGAby7E3yr3rxcuK:35PXEtDUY0DEXmeYeQbtAE7nsLd
Static task
static1
Behavioral task
behavioral1
Sample
b31a6798b0ff3238addb874bf8eb7950_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cominf.ro - Port:
587 - Username:
[email protected] - Password:
a123456!
Targets
-
-
Target
b31a6798b0ff3238addb874bf8eb7950_JaffaCakes118
-
Size
1.1MB
-
MD5
b31a6798b0ff3238addb874bf8eb7950
-
SHA1
11df2edaafcf514782933dfe5d49a26436069028
-
SHA256
d49cc06b3345c9e1ef413d9ed3c3d24e0ca4ed591b9675a60d3682c137aa4506
-
SHA512
110f725fd5bc63db2caae4779a48b1d3bff6696790f5d901330ebca7f96dfb7f9d9b403123d944b23fb9306e5199b51254abbcfa435263b11b914e23b39a4f3e
-
SSDEEP
12288:3G+PP46BWuOl82dbAIxv3c6oHG3pfTwMGnDheeM7YN43ixIzFGAby7E3yr3rxcuK:35PXEtDUY0DEXmeYeQbtAE7nsLd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-