General
-
Target
d8c5b49586b7e0b4f23b4cf538a7566b_JaffaCakes118
-
Size
554KB
-
Sample
240910-wtfr3aydrh
-
MD5
d8c5b49586b7e0b4f23b4cf538a7566b
-
SHA1
6769a4dd3ac8c7fc8ded7102911041a8182ae73d
-
SHA256
2c57a09f5a661a263f35cc304f21af51a55d54795023290618710bde4ecd96ec
-
SHA512
303ee22bd43cfb315f7a95a96d5f2c296d6a5c3992b2c975af7b5bac579bb86040fb7be5fc2ac7a0de328ed9b60e0e82dc9bb48760952dac6469a994f208fc9d
-
SSDEEP
6144:6m62dmWQOzlgWVWdXv+mJL2mMhkTnAVf65PxKmHVpwhsvWqFIORDzX:6OkW3/VWVNMKK6THvzWqfz
Static task
static1
Behavioral task
behavioral1
Sample
d8c5b49586b7e0b4f23b4cf538a7566b_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ceotech.com.tr - Port:
587 - Username:
[email protected] - Password:
Ceo.tech.123
Targets
-
-
Target
d8c5b49586b7e0b4f23b4cf538a7566b_JaffaCakes118
-
Size
554KB
-
MD5
d8c5b49586b7e0b4f23b4cf538a7566b
-
SHA1
6769a4dd3ac8c7fc8ded7102911041a8182ae73d
-
SHA256
2c57a09f5a661a263f35cc304f21af51a55d54795023290618710bde4ecd96ec
-
SHA512
303ee22bd43cfb315f7a95a96d5f2c296d6a5c3992b2c975af7b5bac579bb86040fb7be5fc2ac7a0de328ed9b60e0e82dc9bb48760952dac6469a994f208fc9d
-
SSDEEP
6144:6m62dmWQOzlgWVWdXv+mJL2mMhkTnAVf65PxKmHVpwhsvWqFIORDzX:6OkW3/VWVNMKK6THvzWqfz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-