General
-
Target
e80f7f3321785d10e59901b5b45ea9fb_JaffaCakes118
-
Size
1.2MB
-
Sample
240918-brkysawanp
-
MD5
e80f7f3321785d10e59901b5b45ea9fb
-
SHA1
f31371d866a24cd58e243b2fd9079671713c7c90
-
SHA256
8407de7798cb0c917515d636e6716bc98ed5574d6e03545af65f11595e55183f
-
SHA512
3d81bd86ec451348769934b9f9106c83c5d8cdcd885e9d50378c30f8b4b3b2fefc005ed6695e3e8cffdf735fb2b2402d7b0d678014e1666bc515a3fcbb171522
-
SSDEEP
12288:ofKCzmB6oMbKAn6wRt+50pt78pUC8an8pUC8aaO3l3EywZNV1dgqauorSMPKb8C3:NooMbKK3Z8N8gO3KPZr1dgcoBHC3H
Static task
static1
Behavioral task
behavioral1
Sample
e80f7f3321785d10e59901b5b45ea9fb_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.africa-eco-resp.com - Port:
587 - Username:
[email protected] - Password:
Hubert@2018
Targets
-
-
Target
e80f7f3321785d10e59901b5b45ea9fb_JaffaCakes118
-
Size
1.2MB
-
MD5
e80f7f3321785d10e59901b5b45ea9fb
-
SHA1
f31371d866a24cd58e243b2fd9079671713c7c90
-
SHA256
8407de7798cb0c917515d636e6716bc98ed5574d6e03545af65f11595e55183f
-
SHA512
3d81bd86ec451348769934b9f9106c83c5d8cdcd885e9d50378c30f8b4b3b2fefc005ed6695e3e8cffdf735fb2b2402d7b0d678014e1666bc515a3fcbb171522
-
SSDEEP
12288:ofKCzmB6oMbKAn6wRt+50pt78pUC8an8pUC8aaO3l3EywZNV1dgqauorSMPKb8C3:NooMbKK3Z8N8gO3KPZr1dgcoBHC3H
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-