General
-
Target
ef28f9e3e850cabec44d7e44a53f930a_JaffaCakes118
-
Size
661KB
-
Sample
240921-gbvqyaxcpa
-
MD5
ef28f9e3e850cabec44d7e44a53f930a
-
SHA1
558aefacc918bb9fcc3021eccf95eeb0f17455ee
-
SHA256
2769a09ab0930c0ad48b04e12bd6f82b24a51bef017540776388480f50092821
-
SHA512
ac5e77ec5206164ff7e0a09ae3d2ef20241f4522fa868040ac1f7eb74d537dbf65007fa29b6fbdc28e270770a26c3dda7e97c2a3058518baa885aa0882911c25
-
SSDEEP
12288:9Hvy71oBnMw0K9Uqs7pDwjZhXEvzpPH9bm:9XBMw0qUqstD6fErJdb
Static task
static1
Behavioral task
behavioral1
Sample
ef28f9e3e850cabec44d7e44a53f930a_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.cleannharbor.com - Port:
587 - Username:
[email protected] - Password:
C!@MJND9
Targets
-
-
Target
ef28f9e3e850cabec44d7e44a53f930a_JaffaCakes118
-
Size
661KB
-
MD5
ef28f9e3e850cabec44d7e44a53f930a
-
SHA1
558aefacc918bb9fcc3021eccf95eeb0f17455ee
-
SHA256
2769a09ab0930c0ad48b04e12bd6f82b24a51bef017540776388480f50092821
-
SHA512
ac5e77ec5206164ff7e0a09ae3d2ef20241f4522fa868040ac1f7eb74d537dbf65007fa29b6fbdc28e270770a26c3dda7e97c2a3058518baa885aa0882911c25
-
SSDEEP
12288:9Hvy71oBnMw0K9Uqs7pDwjZhXEvzpPH9bm:9XBMw0qUqstD6fErJdb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-