General
-
Target
f547b51cdf7d2d143b1cbe47d493f6b0_JaffaCakes118
-
Size
668KB
-
Sample
240925-f3mzqsxdmr
-
MD5
f547b51cdf7d2d143b1cbe47d493f6b0
-
SHA1
013fc6ce63a18928d1176d56d9bf713e9673ac32
-
SHA256
231cbb65ca53f39122fe422f9eecfd39867bac941d378aeb6502415fd83b4ea5
-
SHA512
02fda7de75cf0b10c3d7b5c7273b63be8e326c6325dabe2b49596136a2da06f77aa61ad501238f23f9d88ccc48afb31ee2ba7393d1c02082f8d06d0bb7351c46
-
SSDEEP
12288:2UgA+ktHA7cVCs35IkohqRXRZMRRto9E+KQOYAn5h2B3tdx3ACEQAEaYI3yQ5/4e:yFrs3XoiLMRRlD35y3tXQv
Static task
static1
Behavioral task
behavioral1
Sample
f547b51cdf7d2d143b1cbe47d493f6b0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f547b51cdf7d2d143b1cbe47d493f6b0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ablegod1
Targets
-
-
Target
f547b51cdf7d2d143b1cbe47d493f6b0_JaffaCakes118
-
Size
668KB
-
MD5
f547b51cdf7d2d143b1cbe47d493f6b0
-
SHA1
013fc6ce63a18928d1176d56d9bf713e9673ac32
-
SHA256
231cbb65ca53f39122fe422f9eecfd39867bac941d378aeb6502415fd83b4ea5
-
SHA512
02fda7de75cf0b10c3d7b5c7273b63be8e326c6325dabe2b49596136a2da06f77aa61ad501238f23f9d88ccc48afb31ee2ba7393d1c02082f8d06d0bb7351c46
-
SSDEEP
12288:2UgA+ktHA7cVCs35IkohqRXRZMRRto9E+KQOYAn5h2B3tdx3ACEQAEaYI3yQ5/4e:yFrs3XoiLMRRlD35y3tXQv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-