General
-
Target
f6cb6eb02235981971620899d88aa337_JaffaCakes118
-
Size
416KB
-
Sample
240925-y6kb5awcll
-
MD5
f6cb6eb02235981971620899d88aa337
-
SHA1
912eb370190e513ebb0a130bfd2782a4fc2661bc
-
SHA256
8b334c052aa35c751a90affd750f2f0522fe23c68ae332cce60d4c1337a61261
-
SHA512
98cfda3bb8c3bc3c98ff3e577076212e2cc5c3b7379b73a1596bf00371ce5712ecd72e6986d6c67fe89db7adba51c6608c3b86473ec8a6336eda4520776cd50f
-
SSDEEP
6144:GA3TDL3TqokDj/ZyqigHv8qXwuTdJPCRIhlIJl5gAI8OCYrNRaq9qh+3tLglf:GSXkAqiOvKpRPJfgJVCK9glf
Static task
static1
Behavioral task
behavioral1
Sample
f6cb6eb02235981971620899d88aa337_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6cb6eb02235981971620899d88aa337_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@kingmezz.xyz
Targets
-
-
Target
f6cb6eb02235981971620899d88aa337_JaffaCakes118
-
Size
416KB
-
MD5
f6cb6eb02235981971620899d88aa337
-
SHA1
912eb370190e513ebb0a130bfd2782a4fc2661bc
-
SHA256
8b334c052aa35c751a90affd750f2f0522fe23c68ae332cce60d4c1337a61261
-
SHA512
98cfda3bb8c3bc3c98ff3e577076212e2cc5c3b7379b73a1596bf00371ce5712ecd72e6986d6c67fe89db7adba51c6608c3b86473ec8a6336eda4520776cd50f
-
SSDEEP
6144:GA3TDL3TqokDj/ZyqigHv8qXwuTdJPCRIhlIJl5gAI8OCYrNRaq9qh+3tLglf:GSXkAqiOvKpRPJfgJVCK9glf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-