General
-
Target
2801f47d3320ad04acd0bdf13e9bde93_JaffaCakes118
-
Size
870KB
-
Sample
241009-a7149svhjp
-
MD5
2801f47d3320ad04acd0bdf13e9bde93
-
SHA1
0f00245f8c034d378cb76ce75160160882131f19
-
SHA256
3a43468fb19a83677f5192b0feceac3e051319d4e7df8e208690410bf97f41de
-
SHA512
1e1bb3c4a7a153bcac9939f060209fdaba473a765f9669b85ddd73d601b8eeff87faa32dbc2fcfd8598915d2a4eda95ef833ae89bffb28ba9754796e0e01a5e9
-
SSDEEP
12288:93rxhJKQn3qGaNHEyC9/oR9gy5FHK7zqBy6NTVXnkWhio0IK/fgcMzR/kpkWa1IV:9RKwPp9AR95yeBJ4wiJIgfgbzkZsE
Static task
static1
Behavioral task
behavioral1
Sample
2801f47d3320ad04acd0bdf13e9bde93_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2801f47d3320ad04acd0bdf13e9bde93_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
box5363.bluehost.com - Port:
587 - Username:
[email protected] - Password:
Hajarbh@1993
Targets
-
-
Target
2801f47d3320ad04acd0bdf13e9bde93_JaffaCakes118
-
Size
870KB
-
MD5
2801f47d3320ad04acd0bdf13e9bde93
-
SHA1
0f00245f8c034d378cb76ce75160160882131f19
-
SHA256
3a43468fb19a83677f5192b0feceac3e051319d4e7df8e208690410bf97f41de
-
SHA512
1e1bb3c4a7a153bcac9939f060209fdaba473a765f9669b85ddd73d601b8eeff87faa32dbc2fcfd8598915d2a4eda95ef833ae89bffb28ba9754796e0e01a5e9
-
SSDEEP
12288:93rxhJKQn3qGaNHEyC9/oR9gy5FHK7zqBy6NTVXnkWhio0IK/fgcMzR/kpkWa1IV:9RKwPp9AR95yeBJ4wiJIgfgbzkZsE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-