General
-
Target
fff040c5056d604adbd1df3d262ede7d_JaffaCakes118
-
Size
1.3MB
-
Sample
240930-esg53asbld
-
MD5
fff040c5056d604adbd1df3d262ede7d
-
SHA1
abf99fffd0acc99ee4dde6aad5e2b0f0b19e19f8
-
SHA256
17233e3b1e4c05ea54dd6603a52da89b00257baeca58d33fcbd6997a4e22fda0
-
SHA512
20e49cd5312ca27f81b49d59b2872959ca5215bb55e3e15a074abc56a7f031956a48c72c9f5f3cbe748228fceb4aefdf01ff17bf669624d406e5fbf2fa9012af
-
SSDEEP
24576:KAHnh+eWsN3skA4RV1Hom2KXMmHaLz1TbfTNz0LLeyr5:dh+ZkldoPK8YaLz1/hQSG
Static task
static1
Behavioral task
behavioral1
Sample
fff040c5056d604adbd1df3d262ede7d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fff040c5056d604adbd1df3d262ede7d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
kaka1234@1@1
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
kaka1234@1@1
Targets
-
-
Target
fff040c5056d604adbd1df3d262ede7d_JaffaCakes118
-
Size
1.3MB
-
MD5
fff040c5056d604adbd1df3d262ede7d
-
SHA1
abf99fffd0acc99ee4dde6aad5e2b0f0b19e19f8
-
SHA256
17233e3b1e4c05ea54dd6603a52da89b00257baeca58d33fcbd6997a4e22fda0
-
SHA512
20e49cd5312ca27f81b49d59b2872959ca5215bb55e3e15a074abc56a7f031956a48c72c9f5f3cbe748228fceb4aefdf01ff17bf669624d406e5fbf2fa9012af
-
SSDEEP
24576:KAHnh+eWsN3skA4RV1Hom2KXMmHaLz1TbfTNz0LLeyr5:dh+ZkldoPK8YaLz1/hQSG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-