General
-
Target
f8b12a3b329c7d9c07d93c835bb2e410_JaffaCakes118
-
Size
905KB
-
Sample
240926-s5txaavepm
-
MD5
f8b12a3b329c7d9c07d93c835bb2e410
-
SHA1
daea839cb08cbd7dac130483698b5ca1f11c391c
-
SHA256
87bbb97703c44d999ec3940825aa6976feeb8ea6d4c8afac9e7ba222448a35db
-
SHA512
949b2a1e95d0c90ed740163751ff4ba67603ebadd06bca27ede70a8579801053a4d10e5edf5f71f9e2913b7adfb391e7a6de894ceb66b0bf5023b50c40dee467
-
SSDEEP
24576:hNyUY46Z7iYtU+wkxbi0H5GWABXX+0dmj:mtZ7iYtbi0H5I3mj
Static task
static1
Behavioral task
behavioral1
Sample
f8b12a3b329c7d9c07d93c835bb2e410_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.tpts4seed.net - Port:
587 - Username:
[email protected] - Password:
p(HgSgj2
Targets
-
-
Target
f8b12a3b329c7d9c07d93c835bb2e410_JaffaCakes118
-
Size
905KB
-
MD5
f8b12a3b329c7d9c07d93c835bb2e410
-
SHA1
daea839cb08cbd7dac130483698b5ca1f11c391c
-
SHA256
87bbb97703c44d999ec3940825aa6976feeb8ea6d4c8afac9e7ba222448a35db
-
SHA512
949b2a1e95d0c90ed740163751ff4ba67603ebadd06bca27ede70a8579801053a4d10e5edf5f71f9e2913b7adfb391e7a6de894ceb66b0bf5023b50c40dee467
-
SSDEEP
24576:hNyUY46Z7iYtU+wkxbi0H5GWABXX+0dmj:mtZ7iYtbi0H5I3mj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-