General
-
Target
0bf682377f32ef679a518a6e4feca120_JaffaCakes118
-
Size
424KB
-
Sample
240625-chal5avejb
-
MD5
0bf682377f32ef679a518a6e4feca120
-
SHA1
ea88bcee3ff19fa189e9066324ca9149e36a6de4
-
SHA256
21a01507659a6450465efe03894dea6415fc365697c550dc632ab35e2874e7d7
-
SHA512
0e40f664c8bd481d0d07206e6539728cf3f349fb7bc26fcafdfa1a443cca9f809e0a6f340d154e06b8aeffcaeff09deb6b7e488d383574dee846ea6b9a48c535
-
SSDEEP
12288:EPyeTFPDbZ9afKWY0g4XzBUwvXE80yeozP:elbZKK3hulUQXZeMP
Static task
static1
Behavioral task
behavioral1
Sample
0bf682377f32ef679a518a6e4feca120_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0bf682377f32ef679a518a6e4feca120_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot2041348144:AAECRP751u40yyZrAnCcqgQojlk0qhAbHig/sendDocument
Targets
-
-
Target
0bf682377f32ef679a518a6e4feca120_JaffaCakes118
-
Size
424KB
-
MD5
0bf682377f32ef679a518a6e4feca120
-
SHA1
ea88bcee3ff19fa189e9066324ca9149e36a6de4
-
SHA256
21a01507659a6450465efe03894dea6415fc365697c550dc632ab35e2874e7d7
-
SHA512
0e40f664c8bd481d0d07206e6539728cf3f349fb7bc26fcafdfa1a443cca9f809e0a6f340d154e06b8aeffcaeff09deb6b7e488d383574dee846ea6b9a48c535
-
SSDEEP
12288:EPyeTFPDbZ9afKWY0g4XzBUwvXE80yeozP:elbZKK3hulUQXZeMP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-