General
-
Target
44dbc0b4c82ab5027ca0beee6bef5b3f_JaffaCakes118
-
Size
603KB
-
Sample
240714-h8391s1erl
-
MD5
44dbc0b4c82ab5027ca0beee6bef5b3f
-
SHA1
ae27a4a72c904bf4df7946cf065bb4d8cf8e2694
-
SHA256
3f5bd96c293cb80ca6662ac5a385449403adc86fdc4bb55571637385fc2842cb
-
SHA512
accf228f6a127d652568ed811db032cdb6993f0435b284f2927b867481f126b38fd823591446dd3e5d7bd8c31bd31bd67b9834eb867408df37d9d050c7b759db
-
SSDEEP
12288:TEqbotmUgMi6FJm65fiA5uxL2AyO8c+kJT6YashlM0JT6YashlM:wssmURTF9fydxl9ashlV9ashl
Static task
static1
Behavioral task
behavioral1
Sample
44dbc0b4c82ab5027ca0beee6bef5b3f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44dbc0b4c82ab5027ca0beee6bef5b3f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.citechco.net - Port:
587 - Username:
[email protected] - Password:
Webana@321#
Targets
-
-
Target
44dbc0b4c82ab5027ca0beee6bef5b3f_JaffaCakes118
-
Size
603KB
-
MD5
44dbc0b4c82ab5027ca0beee6bef5b3f
-
SHA1
ae27a4a72c904bf4df7946cf065bb4d8cf8e2694
-
SHA256
3f5bd96c293cb80ca6662ac5a385449403adc86fdc4bb55571637385fc2842cb
-
SHA512
accf228f6a127d652568ed811db032cdb6993f0435b284f2927b867481f126b38fd823591446dd3e5d7bd8c31bd31bd67b9834eb867408df37d9d050c7b759db
-
SSDEEP
12288:TEqbotmUgMi6FJm65fiA5uxL2AyO8c+kJT6YashlM0JT6YashlM:wssmURTF9fydxl9ashlV9ashl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-