General
-
Target
e71370db15b7578f635387357f199123_JaffaCakes118
-
Size
774KB
-
Sample
240917-schzbazbkk
-
MD5
e71370db15b7578f635387357f199123
-
SHA1
2c9ef3a68476d38449eae824bdda50b56e122370
-
SHA256
94d32b344c1359f2f20cab6cefec880e6d9d69200d8e45a879c4791df7f7956f
-
SHA512
dfe03b35eb20847fe7ff722f9c512904b5811f449eb8daa924cbbd2044a3097ee93116e94b4afe9859672124abc746c42f32160d134a15f0a23d7b8b9d033de5
-
SSDEEP
12288:cg0kFvLtl8i7s82ELtECtihRXoQknMS0cVMCZrpwcFolcXhmmJ1pTtOa:clkNEiLtECtihR4gcpZyC4Eh1
Static task
static1
Behavioral task
behavioral1
Sample
e71370db15b7578f635387357f199123_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e71370db15b7578f635387357f199123_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cgmpharma.com - Port:
587 - Username:
[email protected] - Password:
pakcgm123
Targets
-
-
Target
e71370db15b7578f635387357f199123_JaffaCakes118
-
Size
774KB
-
MD5
e71370db15b7578f635387357f199123
-
SHA1
2c9ef3a68476d38449eae824bdda50b56e122370
-
SHA256
94d32b344c1359f2f20cab6cefec880e6d9d69200d8e45a879c4791df7f7956f
-
SHA512
dfe03b35eb20847fe7ff722f9c512904b5811f449eb8daa924cbbd2044a3097ee93116e94b4afe9859672124abc746c42f32160d134a15f0a23d7b8b9d033de5
-
SSDEEP
12288:cg0kFvLtl8i7s82ELtECtihRXoQknMS0cVMCZrpwcFolcXhmmJ1pTtOa:clkNEiLtECtihR4gcpZyC4Eh1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-