General
-
Target
029a668b833e8c2ed5d7e68feb6aafe2_JaffaCakes118
-
Size
429KB
-
Sample
240930-wk75ysyarr
-
MD5
029a668b833e8c2ed5d7e68feb6aafe2
-
SHA1
f8d50fd96b6e84645eb7fabd32440b06a4ad9518
-
SHA256
85e3e0df304bc9aa1bf1aab6c2fa0b9141aa2830699087b4edf2bffc06367f9d
-
SHA512
7aae7b995d964a97d4bf85f7b602fd11e69eea3669f8f389e0d448f11e305e42a228ad8d56f90cdea5e0f1a8f06940fc198265083ad4444e5de8a47b93385f9c
-
SSDEEP
6144:tga6NXlEUA+RVGcU78+y1gutr257K4kMd1TMg1KQwvCQgmVn/q/kZEAmg+:ia6FlEh+aptuR21JugdmVn/q/kZEAmD
Static task
static1
Behavioral task
behavioral1
Sample
029a668b833e8c2ed5d7e68feb6aafe2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
029a668b833e8c2ed5d7e68feb6aafe2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ingeniumhea.com - Port:
587 - Username:
[email protected] - Password:
IngeniumM18 - Email To:
[email protected]
Targets
-
-
Target
029a668b833e8c2ed5d7e68feb6aafe2_JaffaCakes118
-
Size
429KB
-
MD5
029a668b833e8c2ed5d7e68feb6aafe2
-
SHA1
f8d50fd96b6e84645eb7fabd32440b06a4ad9518
-
SHA256
85e3e0df304bc9aa1bf1aab6c2fa0b9141aa2830699087b4edf2bffc06367f9d
-
SHA512
7aae7b995d964a97d4bf85f7b602fd11e69eea3669f8f389e0d448f11e305e42a228ad8d56f90cdea5e0f1a8f06940fc198265083ad4444e5de8a47b93385f9c
-
SSDEEP
6144:tga6NXlEUA+RVGcU78+y1gutr257K4kMd1TMg1KQwvCQgmVn/q/kZEAmg+:ia6FlEh+aptuR21JugdmVn/q/kZEAmD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-