General
-
Target
f29678aa262cb167b339d6f82955542a_JaffaCakes118
-
Size
1.9MB
-
Sample
240923-s5rf6a1bql
-
MD5
f29678aa262cb167b339d6f82955542a
-
SHA1
06a39e9f16ad21b80e3deb04127a0f344207b7df
-
SHA256
a35915cd2a0eeec7230a5bf315d96f1fbdb5b75cfb1fed5b9026a5c56672addd
-
SHA512
0a5edcbd34391de38f9b9a6737769ef43d4072ee3dffb5d267a5322580abd2134307dfb525a0a785d02efc5febece72d8675f11e64975bf399fb598c88cf0d73
-
SSDEEP
24576:PtnrOv6R8IYyj2Lw79UcrzlQXEc4UJKW1mHLFeCXDMDY9B7:Jr1nUw79Ucfc4UJKW1mHLFeCXDMDY9B
Static task
static1
Behavioral task
behavioral1
Sample
f29678aa262cb167b339d6f82955542a_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.psbusinesparks.com - Port:
587 - Username:
[email protected] - Password:
Alterative432
Targets
-
-
Target
f29678aa262cb167b339d6f82955542a_JaffaCakes118
-
Size
1.9MB
-
MD5
f29678aa262cb167b339d6f82955542a
-
SHA1
06a39e9f16ad21b80e3deb04127a0f344207b7df
-
SHA256
a35915cd2a0eeec7230a5bf315d96f1fbdb5b75cfb1fed5b9026a5c56672addd
-
SHA512
0a5edcbd34391de38f9b9a6737769ef43d4072ee3dffb5d267a5322580abd2134307dfb525a0a785d02efc5febece72d8675f11e64975bf399fb598c88cf0d73
-
SSDEEP
24576:PtnrOv6R8IYyj2Lw79UcrzlQXEc4UJKW1mHLFeCXDMDY9B7:Jr1nUw79Ucfc4UJKW1mHLFeCXDMDY9B
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-