General
-
Target
f84792e344f97ab2892bf8205ec6de03_JaffaCakes118
-
Size
789KB
-
Sample
240926-nnj9asxhqa
-
MD5
f84792e344f97ab2892bf8205ec6de03
-
SHA1
055d512e4682433997f8bc9ba0b5f6a437249072
-
SHA256
f934eaed742297ebf534db622f7ab4493cc80c450355a322a4290f3ef386881c
-
SHA512
d36ba97550ea2dcfe4b93745441d59a87d315cf0a7d645c4c4f67ff8fea31c00b830b35ec394787b94be57cb27eb6b99fb3f896de718cbcb16834c2e13719dea
-
SSDEEP
24576:pyBHjP6+7LrcYt0GcE+2U9oQMBWFBFtIrCh7tYyNN:g/LkX2d0FBFoCh5D
Static task
static1
Behavioral task
behavioral1
Sample
f84792e344f97ab2892bf8205ec6de03_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f84792e344f97ab2892bf8205ec6de03_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.knmbz.com - Port:
587 - Username:
[email protected] - Password:
sync@12345
Targets
-
-
Target
f84792e344f97ab2892bf8205ec6de03_JaffaCakes118
-
Size
789KB
-
MD5
f84792e344f97ab2892bf8205ec6de03
-
SHA1
055d512e4682433997f8bc9ba0b5f6a437249072
-
SHA256
f934eaed742297ebf534db622f7ab4493cc80c450355a322a4290f3ef386881c
-
SHA512
d36ba97550ea2dcfe4b93745441d59a87d315cf0a7d645c4c4f67ff8fea31c00b830b35ec394787b94be57cb27eb6b99fb3f896de718cbcb16834c2e13719dea
-
SSDEEP
24576:pyBHjP6+7LrcYt0GcE+2U9oQMBWFBFtIrCh7tYyNN:g/LkX2d0FBFoCh5D
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-