General
-
Target
f7edb135ebd6736aebd88ffbb60b0b04_JaffaCakes118
-
Size
932KB
-
Sample
240926-jx55xayglh
-
MD5
f7edb135ebd6736aebd88ffbb60b0b04
-
SHA1
f9e38246112dcebdeffc17bb76fc14de062bbcfd
-
SHA256
b0b88eb53e1b4aa34fca96ab6600b7620ffccce9c485a8f5157bf21e0bf9645c
-
SHA512
a032b9c2694b21e958955c78bfd80ffa12bf8a65421bf9ffbd79044b939760e54c53ceb7ddc3776311e01336bf110f2ac74bc44ef380f12d82543fe6e3672561
-
SSDEEP
24576:NZD1cQJRl7oN0RhBIVduQVKqWTO9NwWfy:vJR+17VK5OIay
Static task
static1
Behavioral task
behavioral1
Sample
f7edb135ebd6736aebd88ffbb60b0b04_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7edb135ebd6736aebd88ffbb60b0b04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hybridgroupco.com - Port:
587 - Username:
[email protected] - Password:
Obinna123@@@
Targets
-
-
Target
f7edb135ebd6736aebd88ffbb60b0b04_JaffaCakes118
-
Size
932KB
-
MD5
f7edb135ebd6736aebd88ffbb60b0b04
-
SHA1
f9e38246112dcebdeffc17bb76fc14de062bbcfd
-
SHA256
b0b88eb53e1b4aa34fca96ab6600b7620ffccce9c485a8f5157bf21e0bf9645c
-
SHA512
a032b9c2694b21e958955c78bfd80ffa12bf8a65421bf9ffbd79044b939760e54c53ceb7ddc3776311e01336bf110f2ac74bc44ef380f12d82543fe6e3672561
-
SSDEEP
24576:NZD1cQJRl7oN0RhBIVduQVKqWTO9NwWfy:vJR+17VK5OIay
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops startup file
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-