General
-
Target
fec3efab196be13217e532dbe7ae1839_JaffaCakes118
-
Size
428KB
-
Sample
240929-sbaasaydqr
-
MD5
fec3efab196be13217e532dbe7ae1839
-
SHA1
4b355e4fb446ea0b36782e4600c3e347af539fdb
-
SHA256
2fe658923add6c0e1fd8be7b284bf117324442fcfda69218cb4c8d6e08c2744d
-
SHA512
1d708e2c2a5e588652c2e04f08afaee7aa05839345024d0a40f3a463c1f2e2bcfa00ce466d561c7f3327fb154b528f281465146a9bd677b70dcf79d53f18f833
-
SSDEEP
6144:tc8OtvOERQ+3HwO9ZfMZ5Nk2LAGkaE2YjXI344rHWHL69IN8OuEhNds+hVv2o4pO:L/ESorEa2LAX2YzI/r2AQ8S3dx0pO
Static task
static1
Behavioral task
behavioral1
Sample
fec3efab196be13217e532dbe7ae1839_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fec3efab196be13217e532dbe7ae1839_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.zfftcn.com - Port:
587 - Username:
[email protected] - Password:
%^QQLa^sa4
Targets
-
-
Target
fec3efab196be13217e532dbe7ae1839_JaffaCakes118
-
Size
428KB
-
MD5
fec3efab196be13217e532dbe7ae1839
-
SHA1
4b355e4fb446ea0b36782e4600c3e347af539fdb
-
SHA256
2fe658923add6c0e1fd8be7b284bf117324442fcfda69218cb4c8d6e08c2744d
-
SHA512
1d708e2c2a5e588652c2e04f08afaee7aa05839345024d0a40f3a463c1f2e2bcfa00ce466d561c7f3327fb154b528f281465146a9bd677b70dcf79d53f18f833
-
SSDEEP
6144:tc8OtvOERQ+3HwO9ZfMZ5Nk2LAGkaE2YjXI344rHWHL69IN8OuEhNds+hVv2o4pO:L/ESorEa2LAX2YzI/r2AQ8S3dx0pO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-