General
-
Target
4611c4f31fbfe87807a66c6de9b1e3cb_JaffaCakes118
-
Size
681KB
-
Sample
241015-f6jrgsxcqd
-
MD5
4611c4f31fbfe87807a66c6de9b1e3cb
-
SHA1
3c972ece41f7336a81663db5961de115407f6806
-
SHA256
e6b82640ac2c3968c8e46825799a6d8cf13dd9015bb61a7895ea1a0e642c2550
-
SHA512
b591ee2d699364edae47a2a260ff49a376c6ae786d4bbdb18a8c3ed36e6ec4c2e83a9b23e42fa033a10849595f197627186d3a0fbd5f088ea290ce0403063730
-
SSDEEP
12288:T7xY/HK7zKzNBjPjOLFQmuLIA/8xfJ4bTb9QYHfE0Oqlmg3NGjWBmv:5uNBjL+cH/8xfy7S0bmsBmv
Static task
static1
Behavioral task
behavioral1
Sample
4611c4f31fbfe87807a66c6de9b1e3cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4611c4f31fbfe87807a66c6de9b1e3cb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
http://sabaint.me/inc/4f4d258ff734e9.php
Targets
-
-
Target
4611c4f31fbfe87807a66c6de9b1e3cb_JaffaCakes118
-
Size
681KB
-
MD5
4611c4f31fbfe87807a66c6de9b1e3cb
-
SHA1
3c972ece41f7336a81663db5961de115407f6806
-
SHA256
e6b82640ac2c3968c8e46825799a6d8cf13dd9015bb61a7895ea1a0e642c2550
-
SHA512
b591ee2d699364edae47a2a260ff49a376c6ae786d4bbdb18a8c3ed36e6ec4c2e83a9b23e42fa033a10849595f197627186d3a0fbd5f088ea290ce0403063730
-
SSDEEP
12288:T7xY/HK7zKzNBjPjOLFQmuLIA/8xfJ4bTb9QYHfE0Oqlmg3NGjWBmv:5uNBjL+cH/8xfy7S0bmsBmv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-