General
-
Target
f7eb3dac5c5fe26865ed2b8724d71227_JaffaCakes118
-
Size
723KB
-
Sample
240926-jtv6jawckj
-
MD5
f7eb3dac5c5fe26865ed2b8724d71227
-
SHA1
1f2a69cbbcd9a761184bf06ae80afa0aed7dc4ad
-
SHA256
30673ca4675d75d6597d5a1bc76ada58e20603961532bd0dcd429fe7879a73f0
-
SHA512
926d5da446882d1fe28b47041e3e12a84bdb338e08bfaba48dd87262cd4caf563b446b35eb18639537a9f40c7f0680135a3cb003ba10948e69f3174ecb9b5d24
-
SSDEEP
12288:pBLZi970Oz6hGy01Oc0D8E40XpXyxnY2b0d3qpLvEQm103pJ5:DLZ7AOHoWXpUY534qmpJ5
Static task
static1
Behavioral task
behavioral1
Sample
f7eb3dac5c5fe26865ed2b8724d71227_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@Mexico1.,
Targets
-
-
Target
f7eb3dac5c5fe26865ed2b8724d71227_JaffaCakes118
-
Size
723KB
-
MD5
f7eb3dac5c5fe26865ed2b8724d71227
-
SHA1
1f2a69cbbcd9a761184bf06ae80afa0aed7dc4ad
-
SHA256
30673ca4675d75d6597d5a1bc76ada58e20603961532bd0dcd429fe7879a73f0
-
SHA512
926d5da446882d1fe28b47041e3e12a84bdb338e08bfaba48dd87262cd4caf563b446b35eb18639537a9f40c7f0680135a3cb003ba10948e69f3174ecb9b5d24
-
SSDEEP
12288:pBLZi970Oz6hGy01Oc0D8E40XpXyxnY2b0d3qpLvEQm103pJ5:DLZ7AOHoWXpUY534qmpJ5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-