General
-
Target
c8db7a93343ac9b5225971e64aca4aa6_JaffaCakes118
-
Size
648KB
-
Sample
240829-p592qasemf
-
MD5
c8db7a93343ac9b5225971e64aca4aa6
-
SHA1
ddfb58da5155bdcc7957a3da7fbb1e9a4c8fb02e
-
SHA256
f9989bce3ddcc0eb0f95bae744a31bd28e06b229f2757ad7fe7a92c8952ac78f
-
SHA512
ecf28706aa4ab2afc8b764d21fe138ef023c17024ee0bf8a16f6000595ee7bd7534a4341b593b84dce0a20fff07a4d98df6a4b81654291397e5cbf7aea277a8e
-
SSDEEP
12288:UNmKCvxGbhlCp80NvfwbOO6D6JxzdKBjEf3SlKP1qkIsc:0CpGfL0NvUD6D6JxzygfWKP1PZ
Static task
static1
Behavioral task
behavioral1
Sample
c8db7a93343ac9b5225971e64aca4aa6_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com.tr - Port:
587 - Username:
[email protected] - Password:
Safirxxx01
Targets
-
-
Target
c8db7a93343ac9b5225971e64aca4aa6_JaffaCakes118
-
Size
648KB
-
MD5
c8db7a93343ac9b5225971e64aca4aa6
-
SHA1
ddfb58da5155bdcc7957a3da7fbb1e9a4c8fb02e
-
SHA256
f9989bce3ddcc0eb0f95bae744a31bd28e06b229f2757ad7fe7a92c8952ac78f
-
SHA512
ecf28706aa4ab2afc8b764d21fe138ef023c17024ee0bf8a16f6000595ee7bd7534a4341b593b84dce0a20fff07a4d98df6a4b81654291397e5cbf7aea277a8e
-
SSDEEP
12288:UNmKCvxGbhlCp80NvfwbOO6D6JxzdKBjEf3SlKP1qkIsc:0CpGfL0NvUD6D6JxzygfWKP1PZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-