General
-
Target
f15857b8ea1100109a34a30f3c661919_JaffaCakes118
-
Size
531KB
-
Sample
240922-fwk7katbjp
-
MD5
f15857b8ea1100109a34a30f3c661919
-
SHA1
45bb29c85fc283e91ed586ae2709f91c06608597
-
SHA256
c40494d637703cf522f63d0da647f840bbe38af14682c54b714d2a4ce885d849
-
SHA512
c21fc3899611203a291db75b72c3fcbdd94bfc39d4b9240b21f5e793de3f0f28141f58394ebaffb1bad71948c1b54f02b64990a8366a1c12edea40047d79a012
-
SSDEEP
6144:7f2Mn+vTVWLJPYE+vZz9cYoWw/QFP37jQZqcXk1svNx10Vssge/PtRx/I0XjX:r2M+Rq3+vbcYolU/QZVX7vNeV7/xXj
Static task
static1
Behavioral task
behavioral1
Sample
f15857b8ea1100109a34a30f3c661919_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f15857b8ea1100109a34a30f3c661919_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cleo2solutions.com.au - Port:
587 - Username:
[email protected] - Password:
eve41#0221F
Targets
-
-
Target
f15857b8ea1100109a34a30f3c661919_JaffaCakes118
-
Size
531KB
-
MD5
f15857b8ea1100109a34a30f3c661919
-
SHA1
45bb29c85fc283e91ed586ae2709f91c06608597
-
SHA256
c40494d637703cf522f63d0da647f840bbe38af14682c54b714d2a4ce885d849
-
SHA512
c21fc3899611203a291db75b72c3fcbdd94bfc39d4b9240b21f5e793de3f0f28141f58394ebaffb1bad71948c1b54f02b64990a8366a1c12edea40047d79a012
-
SSDEEP
6144:7f2Mn+vTVWLJPYE+vZz9cYoWw/QFP37jQZqcXk1svNx10Vssge/PtRx/I0XjX:r2M+Rq3+vbcYolU/QZVX7vNeV7/xXj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-