General
-
Target
d1a58d0508d797b3845086889771ac28_JaffaCakes118
-
Size
699KB
-
Sample
240907-lr4q1axhle
-
MD5
d1a58d0508d797b3845086889771ac28
-
SHA1
d51ea603023330a41970b7a154e9e787eda69731
-
SHA256
45656215dd38d8ef1a24b5cdf66fc115577a765b7ad0a2c3252b19db48206b65
-
SHA512
48bbeaf268ae3d67c24d09a15935beffbc464698b49c7c1cdf4c715b2ec9512c854d44a70c97a08c8d184c19cccfa15f5fd9ffa51bc59f2691d9d97b55e1c5e2
-
SSDEEP
12288:znphR/P5+70pKXQlNYZ+LPUCoaX1XpA9iMK9g24Vi7Y9O3:7Z/zboG1puiP9grV8Y9
Static task
static1
Behavioral task
behavioral1
Sample
d1a58d0508d797b3845086889771ac28_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
agenttesla
http://www.eurex.ps/english/engine1/Panel/inc/8e83216fb5c206.php
Targets
-
-
Target
d1a58d0508d797b3845086889771ac28_JaffaCakes118
-
Size
699KB
-
MD5
d1a58d0508d797b3845086889771ac28
-
SHA1
d51ea603023330a41970b7a154e9e787eda69731
-
SHA256
45656215dd38d8ef1a24b5cdf66fc115577a765b7ad0a2c3252b19db48206b65
-
SHA512
48bbeaf268ae3d67c24d09a15935beffbc464698b49c7c1cdf4c715b2ec9512c854d44a70c97a08c8d184c19cccfa15f5fd9ffa51bc59f2691d9d97b55e1c5e2
-
SSDEEP
12288:znphR/P5+70pKXQlNYZ+LPUCoaX1XpA9iMK9g24Vi7Y9O3:7Z/zboG1puiP9grV8Y9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-