General
-
Target
f53ea5f974cda8d558509f2151166403_JaffaCakes118
-
Size
473KB
-
Sample
240925-fpcxlszbmg
-
MD5
f53ea5f974cda8d558509f2151166403
-
SHA1
b7d5fabc884c6b5f6eed6892ed75b2ed59f44b2e
-
SHA256
f2d8133a996e9947b5856f73cf72084c9d4f8ebf4236103552a4ba0d48e21818
-
SHA512
c5707dbbc180bac8f797187a14480f266ed4c2c69c803d297583b3551012dca8b741b64b98b30007a8c3f9dee31b9d33e66d9b60457b16c7ca99698a2e4784e9
-
SSDEEP
12288:4jR/SQVieU43JL+DkAUBQLvdhsv4RldSenjpAZnrehqb:wR/SQVi743JL+DlLw4j8ej+triq
Static task
static1
Behavioral task
behavioral1
Sample
f53ea5f974cda8d558509f2151166403_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f53ea5f974cda8d558509f2151166403_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
premium124.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
somtochukwu12345
Targets
-
-
Target
f53ea5f974cda8d558509f2151166403_JaffaCakes118
-
Size
473KB
-
MD5
f53ea5f974cda8d558509f2151166403
-
SHA1
b7d5fabc884c6b5f6eed6892ed75b2ed59f44b2e
-
SHA256
f2d8133a996e9947b5856f73cf72084c9d4f8ebf4236103552a4ba0d48e21818
-
SHA512
c5707dbbc180bac8f797187a14480f266ed4c2c69c803d297583b3551012dca8b741b64b98b30007a8c3f9dee31b9d33e66d9b60457b16c7ca99698a2e4784e9
-
SSDEEP
12288:4jR/SQVieU43JL+DkAUBQLvdhsv4RldSenjpAZnrehqb:wR/SQVi743JL+DlLw4j8ej+triq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-