General
-
Target
f8b193e6106032540dd2398cad8e3430_JaffaCakes118
-
Size
539KB
-
Sample
240926-s6cpdsyaqb
-
MD5
f8b193e6106032540dd2398cad8e3430
-
SHA1
3fd5eb46f3deefd547fcba79315d8aa96e8d75dc
-
SHA256
d000a3af56339c902adef6d7fa670e12d3d682cc8b31e9499cf00f74ba6c06b3
-
SHA512
fe07d427f6ac55be0ee9f97ed0e1c7983c7dfc3794da50218acdd06a7911aeed9a65cbf6c6fed9603391f17bd23b7119ce6112ef4cba879c226d7fcf655125dd
-
SSDEEP
12288:S0E7/yQ+npU7JgqjMjVmdyD3qnWoJRncj:27/E+tgqjMheyD3qTrne
Static task
static1
Behavioral task
behavioral1
Sample
f8b193e6106032540dd2398cad8e3430_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.florencebeautyandnail.nl - Port:
587 - Username:
[email protected] - Password:
tanga333
Targets
-
-
Target
f8b193e6106032540dd2398cad8e3430_JaffaCakes118
-
Size
539KB
-
MD5
f8b193e6106032540dd2398cad8e3430
-
SHA1
3fd5eb46f3deefd547fcba79315d8aa96e8d75dc
-
SHA256
d000a3af56339c902adef6d7fa670e12d3d682cc8b31e9499cf00f74ba6c06b3
-
SHA512
fe07d427f6ac55be0ee9f97ed0e1c7983c7dfc3794da50218acdd06a7911aeed9a65cbf6c6fed9603391f17bd23b7119ce6112ef4cba879c226d7fcf655125dd
-
SSDEEP
12288:S0E7/yQ+npU7JgqjMjVmdyD3qnWoJRncj:27/E+tgqjMheyD3qTrne
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-