General
-
Target
f720dc75b1260f81bf74e258b6793f6d_JaffaCakes118
-
Size
392KB
-
Sample
240926-adts4avgqj
-
MD5
f720dc75b1260f81bf74e258b6793f6d
-
SHA1
b352d5ced8b1648f8448a116fe0ca59310a7c191
-
SHA256
e11736f470654e19618c67d3a63e705bcfa9f854dd0345abb121992fb5019cf3
-
SHA512
c64563e45efea99e3bc8b17c105a2a44b9965e156cab83f8cee4665cd5ef3adbfc88d87c4100446006b85ee4b8fa8a21385d555e03689d4720d4e3b6164edfdd
-
SSDEEP
12288:A7J6H3twmbZyw8nLWcn/TQTZKNY0oQghPDPM:A7J6SIwvT/290TghQ
Static task
static1
Behavioral task
behavioral1
Sample
f720dc75b1260f81bf74e258b6793f6d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f720dc75b1260f81bf74e258b6793f6d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ejazontheweb.com - Port:
587 - Username:
[email protected] - Password:
t%[D2FmSeQezu,}e
Targets
-
-
Target
f720dc75b1260f81bf74e258b6793f6d_JaffaCakes118
-
Size
392KB
-
MD5
f720dc75b1260f81bf74e258b6793f6d
-
SHA1
b352d5ced8b1648f8448a116fe0ca59310a7c191
-
SHA256
e11736f470654e19618c67d3a63e705bcfa9f854dd0345abb121992fb5019cf3
-
SHA512
c64563e45efea99e3bc8b17c105a2a44b9965e156cab83f8cee4665cd5ef3adbfc88d87c4100446006b85ee4b8fa8a21385d555e03689d4720d4e3b6164edfdd
-
SSDEEP
12288:A7J6H3twmbZyw8nLWcn/TQTZKNY0oQghPDPM:A7J6SIwvT/290TghQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-