General
-
Target
cc88c1ddff516c4f629c305ae04b1770_JaffaCakes118
-
Size
688KB
-
Sample
240831-k498wawdnp
-
MD5
cc88c1ddff516c4f629c305ae04b1770
-
SHA1
046b90fc5614b50a5efab364e7b5889c13730f41
-
SHA256
8f128126322df89a84daeff6e86a4b50345505cd5ac83cde439a810c482ae9e5
-
SHA512
f43092602fa7d68881d72deda6f7895be1a1768de386603cb32ed2ebf9f3c4cbd1bd5513a094f05dc27acf9452dd6f02ca8cee68d27283b42d80f2af4420d7c1
-
SSDEEP
12288:V+qTnDZwmVXYjW5ITa4HxGbhs6zC8ILPZglgbelNrZsQAOf/dE3VRWnBjizXszMp:OTRG2PZNbe1sQAK/dcRUiE
Static task
static1
Behavioral task
behavioral1
Sample
cc88c1ddff516c4f629c305ae04b1770_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Simple262627
Targets
-
-
Target
cc88c1ddff516c4f629c305ae04b1770_JaffaCakes118
-
Size
688KB
-
MD5
cc88c1ddff516c4f629c305ae04b1770
-
SHA1
046b90fc5614b50a5efab364e7b5889c13730f41
-
SHA256
8f128126322df89a84daeff6e86a4b50345505cd5ac83cde439a810c482ae9e5
-
SHA512
f43092602fa7d68881d72deda6f7895be1a1768de386603cb32ed2ebf9f3c4cbd1bd5513a094f05dc27acf9452dd6f02ca8cee68d27283b42d80f2af4420d7c1
-
SSDEEP
12288:V+qTnDZwmVXYjW5ITa4HxGbhs6zC8ILPZglgbelNrZsQAOf/dE3VRWnBjizXszMp:OTRG2PZNbe1sQAK/dcRUiE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-