General
-
Target
ec50c6d400be5983b13bf054d4d9d386_JaffaCakes118
-
Size
1022KB
-
Sample
240919-2ghc1svclr
-
MD5
ec50c6d400be5983b13bf054d4d9d386
-
SHA1
b34875539743a8914766e88722778ef08aa04875
-
SHA256
07c08ec8db58e10671dea2e27e69032477b2c9994986d3ddd7d6b5b6cefe5502
-
SHA512
490701bae899c5547a79dcea213827e634a68b7f4ad0c85dbc6303f6dfc0475a6707b9d660810044c1e96b67e193c5d9d8feaf4933fbf504f6e1f92ebee2efdf
-
SSDEEP
12288:EhmXpnjWjXPjjXPcjzjVOjzjzjzjzjHjNva8KOB2zS+cWA0BfIQ/p6qq5p:EvaxOBOcz0BDZq5
Static task
static1
Behavioral task
behavioral1
Sample
ec50c6d400be5983b13bf054d4d9d386_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ec50c6d400be5983b13bf054d4d9d386_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pars-science.ir - Port:
587 - Username:
[email protected] - Password:
#=$MSvxp}1gG
Targets
-
-
Target
ec50c6d400be5983b13bf054d4d9d386_JaffaCakes118
-
Size
1022KB
-
MD5
ec50c6d400be5983b13bf054d4d9d386
-
SHA1
b34875539743a8914766e88722778ef08aa04875
-
SHA256
07c08ec8db58e10671dea2e27e69032477b2c9994986d3ddd7d6b5b6cefe5502
-
SHA512
490701bae899c5547a79dcea213827e634a68b7f4ad0c85dbc6303f6dfc0475a6707b9d660810044c1e96b67e193c5d9d8feaf4933fbf504f6e1f92ebee2efdf
-
SSDEEP
12288:EhmXpnjWjXPjjXPcjzjVOjzjzjzjzjHjNva8KOB2zS+cWA0BfIQ/p6qq5p:EvaxOBOcz0BDZq5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-