General
-
Target
9652330ab6418fd08e6130b97b7b2084_JaffaCakes118
-
Size
640KB
-
Sample
240814-qyrr8szdpq
-
MD5
9652330ab6418fd08e6130b97b7b2084
-
SHA1
256f9b59bc35a14e73deca89629c559a8d492770
-
SHA256
bd0014196cf5e5a030917ea1a43d48ac81891083d8b8e29cb874a97e482fde83
-
SHA512
efff8730db0111687fc2e6d66cf78b49cff6dcee51cf82476618098f4d691c238ee340edc9e83b20cf3d5c7667fb3cbfd6cd9d074ada81fa5be0be8a563d45c7
-
SSDEEP
6144:qir2DCXrujs9WbZWtSldOkt63H6gNgF0JU3WZxF+4oWBF4gPOv8UZd/mzfcNx0hX:qiCu7uwS+yx03jyR3eqWbr2EUZPWh
Static task
static1
Behavioral task
behavioral1
Sample
9652330ab6418fd08e6130b97b7b2084_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.lps.property - Port:
587 - Username:
[email protected] - Password:
r1jDC2BLR@@@@@@@@@
Targets
-
-
Target
9652330ab6418fd08e6130b97b7b2084_JaffaCakes118
-
Size
640KB
-
MD5
9652330ab6418fd08e6130b97b7b2084
-
SHA1
256f9b59bc35a14e73deca89629c559a8d492770
-
SHA256
bd0014196cf5e5a030917ea1a43d48ac81891083d8b8e29cb874a97e482fde83
-
SHA512
efff8730db0111687fc2e6d66cf78b49cff6dcee51cf82476618098f4d691c238ee340edc9e83b20cf3d5c7667fb3cbfd6cd9d074ada81fa5be0be8a563d45c7
-
SSDEEP
6144:qir2DCXrujs9WbZWtSldOkt63H6gNgF0JU3WZxF+4oWBF4gPOv8UZd/mzfcNx0hX:qiCu7uwS+yx03jyR3eqWbr2EUZPWh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-