General
-
Target
25739f14a967ec3d4c21beb0ef7db081_JaffaCakes118
-
Size
1.1MB
-
Sample
241008-zx3msazhme
-
MD5
25739f14a967ec3d4c21beb0ef7db081
-
SHA1
6fb428ffb2d67a69ac4427c8fcb6d28443ec557d
-
SHA256
7f5d47643ef02e7a4c2e00b445ba1f78122c7773b5b27fecfccd29260e7cc52e
-
SHA512
79087fddd79f70005c726734ba5796397c317991287367c0f7f57332804e697a1148c6b9cc46ec086d012603016749263c07746a9529d6e086b489af48e99d43
-
SSDEEP
12288:v0gst2u8Q5iHw6Nd/hY1muKgIcMNwY6KA13pinSHHcD/xXfIhfnG:8gsF8Q5iNnK1JKg9owcAZp
Static task
static1
Behavioral task
behavioral1
Sample
25739f14a967ec3d4c21beb0ef7db081_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25739f14a967ec3d4c21beb0ef7db081_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.brimaq.com - Port:
587 - Username:
[email protected] - Password:
brimaQ2012 - Email To:
[email protected]
Targets
-
-
Target
25739f14a967ec3d4c21beb0ef7db081_JaffaCakes118
-
Size
1.1MB
-
MD5
25739f14a967ec3d4c21beb0ef7db081
-
SHA1
6fb428ffb2d67a69ac4427c8fcb6d28443ec557d
-
SHA256
7f5d47643ef02e7a4c2e00b445ba1f78122c7773b5b27fecfccd29260e7cc52e
-
SHA512
79087fddd79f70005c726734ba5796397c317991287367c0f7f57332804e697a1148c6b9cc46ec086d012603016749263c07746a9529d6e086b489af48e99d43
-
SSDEEP
12288:v0gst2u8Q5iHw6Nd/hY1muKgIcMNwY6KA13pinSHHcD/xXfIhfnG:8gsF8Q5iNnK1JKg9owcAZp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-