General
-
Target
ed8ef945d7d259824b4b5590c539c0b6_JaffaCakes118
-
Size
737KB
-
Sample
240920-pc4dgawcqn
-
MD5
ed8ef945d7d259824b4b5590c539c0b6
-
SHA1
5e2768f9c981e83c4761a849b4b6b19cc1decc61
-
SHA256
abeb6c60fb8519e50226482c903a270a9d5012370e082f6a60aca96c64ff9cc1
-
SHA512
b519fd4c992b041cd329a1d6bed9ec3f927aa1279c69eb87ef325023a4a277d426518e08475c1da24a016606a679796bb125273bbd2d10add8be3d9c15749ca6
-
SSDEEP
12288:jSQYzdnLpsnzBhGxR3PqG073wHGc6uB3XdtgnUPTZ:jSlzdn4Tw3iGEkwuBdKQ
Static task
static1
Behavioral task
behavioral1
Sample
ed8ef945d7d259824b4b5590c539c0b6_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
#Wild123
Targets
-
-
Target
ed8ef945d7d259824b4b5590c539c0b6_JaffaCakes118
-
Size
737KB
-
MD5
ed8ef945d7d259824b4b5590c539c0b6
-
SHA1
5e2768f9c981e83c4761a849b4b6b19cc1decc61
-
SHA256
abeb6c60fb8519e50226482c903a270a9d5012370e082f6a60aca96c64ff9cc1
-
SHA512
b519fd4c992b041cd329a1d6bed9ec3f927aa1279c69eb87ef325023a4a277d426518e08475c1da24a016606a679796bb125273bbd2d10add8be3d9c15749ca6
-
SSDEEP
12288:jSQYzdnLpsnzBhGxR3PqG073wHGc6uB3XdtgnUPTZ:jSlzdn4Tw3iGEkwuBdKQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-