General
-
Target
f7b4a4135da18217e8b22202202d476c_JaffaCakes118
-
Size
1008KB
-
Sample
240926-gjpjws1cjr
-
MD5
f7b4a4135da18217e8b22202202d476c
-
SHA1
6042ac8d0459ddebb2734ebcd4cc139a14589baa
-
SHA256
1ff34618be1d5570d868a6825618ec9af4019acd9a3d7cfc56592b06d4fd8644
-
SHA512
e510c9be66e3fc346c07a291380df3470eb33fb505768598f0d3670651b0e10c941c6a23fd9c6d185d96d8f9668e36b6971e605ccf39360f86be828518d5e271
-
SSDEEP
12288:TpEDiOcATbCJwhbmEvjIsO6pxvwDDTiXz3E+5ulb5:Tp2iOcImELI76vwuDJ
Static task
static1
Behavioral task
behavioral1
Sample
f7b4a4135da18217e8b22202202d476c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f7b4a4135da18217e8b22202202d476c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
77.83.117.234 - Port:
587 - Username:
[email protected] - Password:
8txksCN56
Targets
-
-
Target
f7b4a4135da18217e8b22202202d476c_JaffaCakes118
-
Size
1008KB
-
MD5
f7b4a4135da18217e8b22202202d476c
-
SHA1
6042ac8d0459ddebb2734ebcd4cc139a14589baa
-
SHA256
1ff34618be1d5570d868a6825618ec9af4019acd9a3d7cfc56592b06d4fd8644
-
SHA512
e510c9be66e3fc346c07a291380df3470eb33fb505768598f0d3670651b0e10c941c6a23fd9c6d185d96d8f9668e36b6971e605ccf39360f86be828518d5e271
-
SSDEEP
12288:TpEDiOcATbCJwhbmEvjIsO6pxvwDDTiXz3E+5ulb5:Tp2iOcImELI76vwuDJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-