General
-
Target
fff1a9e27b6b1531277180da9cc27497_JaffaCakes118
-
Size
503KB
-
Sample
240930-evkzqssclg
-
MD5
fff1a9e27b6b1531277180da9cc27497
-
SHA1
eecbbdf5f8af777baa93fb14b07abc8f800ce73b
-
SHA256
787bbb324bff5c9623f81bcfb8eb548a5938a50323c594440bc46dacd52276a4
-
SHA512
0f2cc8bf3f5dd1833280b1ab3bda4d8a43acf1d308682c9fca6fe62e1dfba39c6e88290ad5e37fbe56682e2327ecffae37e6573ffae1f80b65afb0446189a973
-
SSDEEP
6144:ombGtcRT11aXr14c6eSnfFCaiilH8kSOOdis/mKJX9//STR5uAlkawOIdjT0XmGa:ojtcvAbuZnM4H8FHJX9iTuk14EXmGsh
Static task
static1
Behavioral task
behavioral1
Sample
fff1a9e27b6b1531277180da9cc27497_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fff1a9e27b6b1531277180da9cc27497_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Good1234@@@
Targets
-
-
Target
fff1a9e27b6b1531277180da9cc27497_JaffaCakes118
-
Size
503KB
-
MD5
fff1a9e27b6b1531277180da9cc27497
-
SHA1
eecbbdf5f8af777baa93fb14b07abc8f800ce73b
-
SHA256
787bbb324bff5c9623f81bcfb8eb548a5938a50323c594440bc46dacd52276a4
-
SHA512
0f2cc8bf3f5dd1833280b1ab3bda4d8a43acf1d308682c9fca6fe62e1dfba39c6e88290ad5e37fbe56682e2327ecffae37e6573ffae1f80b65afb0446189a973
-
SSDEEP
6144:ombGtcRT11aXr14c6eSnfFCaiilH8kSOOdis/mKJX9//STR5uAlkawOIdjT0XmGa:ojtcvAbuZnM4H8FHJX9iTuk14EXmGsh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-