General
-
Target
055c7b3bb4cfdc848302fc355b283bdf_JaffaCakes118
-
Size
299KB
-
Sample
241001-lztwrstcjq
-
MD5
055c7b3bb4cfdc848302fc355b283bdf
-
SHA1
3dfdd9c427551cd934925384dd80f64b88176c6e
-
SHA256
166bc7ce7a1d7395985340613e88e3058aa277a37b2079ff6c3bde6d3992a141
-
SHA512
9db6b009a757d6759c2284e2ab55ffc1f7c4497847af1994ccfb8cc210706313275da9f611e64bebac609c642d90c5510786706aaadabf172e4b6973fafa048a
-
SSDEEP
6144:kLfRiOnGUcvnRFRInVG8ALNIRzjtHBZwIxFXAvNaqivUXAiicBS:kLfR/kNMAOJCIHAvNxiv7iisS
Static task
static1
Behavioral task
behavioral1
Sample
055c7b3bb4cfdc848302fc355b283bdf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
055c7b3bb4cfdc848302fc355b283bdf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sajbh.com - Port:
587 - Username:
[email protected] - Password:
Saj@2014 - Email To:
[email protected]
Targets
-
-
Target
055c7b3bb4cfdc848302fc355b283bdf_JaffaCakes118
-
Size
299KB
-
MD5
055c7b3bb4cfdc848302fc355b283bdf
-
SHA1
3dfdd9c427551cd934925384dd80f64b88176c6e
-
SHA256
166bc7ce7a1d7395985340613e88e3058aa277a37b2079ff6c3bde6d3992a141
-
SHA512
9db6b009a757d6759c2284e2ab55ffc1f7c4497847af1994ccfb8cc210706313275da9f611e64bebac609c642d90c5510786706aaadabf172e4b6973fafa048a
-
SSDEEP
6144:kLfRiOnGUcvnRFRInVG8ALNIRzjtHBZwIxFXAvNaqivUXAiicBS:kLfR/kNMAOJCIHAvNxiv7iisS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-