General
-
Target
db964a2ad7ea5f65d58dc193d419fceb_JaffaCakes118
-
Size
906KB
-
Sample
240912-b1sd8avarb
-
MD5
db964a2ad7ea5f65d58dc193d419fceb
-
SHA1
ead11670ff23a97222d5f27fdf98ae171972ba8e
-
SHA256
a2cc3011d1f32622b83d267abcb0f3d12a144284b2139fe77c650ae8fe6d961c
-
SHA512
0b1443cc30a527cd9e95c6b11599acc36c3e79b04630b9f75bbd29810d3097b3d0b0a5e2777ce1f2159dc0c41011929fcd059e19736f093513de2f604132dce2
-
SSDEEP
24576:RsbecYs6Z7iYtU+wkx5udlW6MEOSLMxvmj:L5Z7iYt5u3XMr6Mvmj
Static task
static1
Behavioral task
behavioral1
Sample
db964a2ad7ea5f65d58dc193d419fceb_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mygsac.com/ - Port:
21 - Username:
[email protected] - Password:
i&&G=X??@XwB
Targets
-
-
Target
db964a2ad7ea5f65d58dc193d419fceb_JaffaCakes118
-
Size
906KB
-
MD5
db964a2ad7ea5f65d58dc193d419fceb
-
SHA1
ead11670ff23a97222d5f27fdf98ae171972ba8e
-
SHA256
a2cc3011d1f32622b83d267abcb0f3d12a144284b2139fe77c650ae8fe6d961c
-
SHA512
0b1443cc30a527cd9e95c6b11599acc36c3e79b04630b9f75bbd29810d3097b3d0b0a5e2777ce1f2159dc0c41011929fcd059e19736f093513de2f604132dce2
-
SSDEEP
24576:RsbecYs6Z7iYtU+wkx5udlW6MEOSLMxvmj:L5Z7iYt5u3XMr6Mvmj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-