General
-
Target
6360cb9fe59b8ae041c11f651e377c1e_JaffaCakes118
-
Size
605KB
-
Sample
240722-qw2jna1cjk
-
MD5
6360cb9fe59b8ae041c11f651e377c1e
-
SHA1
b89170abea3e65a825aecd679e047d4839654fca
-
SHA256
7410ac67979b82ac850d90f1e3a66494c958952c54fcd1035f78f3b84ed4d7b5
-
SHA512
55ad9dbe397e14c43dc43286a978c0c7975922f878f78c825a116513a9a5a7f2b45454f2cd57f7d8a07f12b96b94fdb4418e207fc42375836278f3d79184bb74
-
SSDEEP
12288:TZoeeR5lI2CC2l/ADeW4MbI2qfbEIg7JT6YashlM0JT6YashlM:1JeXG2CLYDe202MbEIg19ashlV9ashl
Static task
static1
Behavioral task
behavioral1
Sample
6360cb9fe59b8ae041c11f651e377c1e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6360cb9fe59b8ae041c11f651e377c1e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.huishenchain.com - Port:
587 - Username:
[email protected] - Password:
mIWR%*R1
Targets
-
-
Target
6360cb9fe59b8ae041c11f651e377c1e_JaffaCakes118
-
Size
605KB
-
MD5
6360cb9fe59b8ae041c11f651e377c1e
-
SHA1
b89170abea3e65a825aecd679e047d4839654fca
-
SHA256
7410ac67979b82ac850d90f1e3a66494c958952c54fcd1035f78f3b84ed4d7b5
-
SHA512
55ad9dbe397e14c43dc43286a978c0c7975922f878f78c825a116513a9a5a7f2b45454f2cd57f7d8a07f12b96b94fdb4418e207fc42375836278f3d79184bb74
-
SSDEEP
12288:TZoeeR5lI2CC2l/ADeW4MbI2qfbEIg7JT6YashlM0JT6YashlM:1JeXG2CLYDe202MbEIg19ashlV9ashl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-