General
-
Target
fc0ac96b4d0826d27363c4ee1f52bbac_JaffaCakes118
-
Size
926KB
-
Sample
240928-lwq1pszaln
-
MD5
fc0ac96b4d0826d27363c4ee1f52bbac
-
SHA1
d9627029ce67dd8f8566efcdc3199e3f6b5ae2b7
-
SHA256
20d3cfdb31efea5342fbc7bec9f0e3c5342ea0d370e9fe33a4fd3506f2129cdd
-
SHA512
83b54b84c4eebf37dc08534bb323be08b2963d1c9f94403ec241b7994086ea3de7f55382cf441774c0f834630aa8075b24a4a28753789e78e8a4b4b31d51e7fd
-
SSDEEP
12288:gAO6ZPvq1igKj7QAFGfrPizk/vQLkCuthjCTmiN6xuaLKKcVOcfVJ2+Dsiy:SiPuOQAFIDCk3ykCuthjiN6fL2Dfn8
Static task
static1
Behavioral task
behavioral1
Sample
fc0ac96b4d0826d27363c4ee1f52bbac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc0ac96b4d0826d27363c4ee1f52bbac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.pancare.lk - Port:
587 - Username:
[email protected] - Password:
[email protected]
Targets
-
-
Target
fc0ac96b4d0826d27363c4ee1f52bbac_JaffaCakes118
-
Size
926KB
-
MD5
fc0ac96b4d0826d27363c4ee1f52bbac
-
SHA1
d9627029ce67dd8f8566efcdc3199e3f6b5ae2b7
-
SHA256
20d3cfdb31efea5342fbc7bec9f0e3c5342ea0d370e9fe33a4fd3506f2129cdd
-
SHA512
83b54b84c4eebf37dc08534bb323be08b2963d1c9f94403ec241b7994086ea3de7f55382cf441774c0f834630aa8075b24a4a28753789e78e8a4b4b31d51e7fd
-
SSDEEP
12288:gAO6ZPvq1igKj7QAFGfrPizk/vQLkCuthjCTmiN6xuaLKKcVOcfVJ2+Dsiy:SiPuOQAFIDCk3ykCuthjiN6fL2Dfn8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-