General
-
Target
fed71b10b7e687e2a79d50d54432825c_JaffaCakes118
-
Size
840KB
-
Sample
241219-hd24gatmgn
-
MD5
fed71b10b7e687e2a79d50d54432825c
-
SHA1
271748f737c25ccde7403c57afc342a41bf7de99
-
SHA256
373d7750fb5c6c9a20651b2267fa23840da0a288f62bed277ec1560ba1d7bab7
-
SHA512
4704650ad4f0037e48de4c3f455568f0c8d0b0b4bb4082a5dce764fee8f3f28ff7713bc6ab4ee6571362da9c07e26f63b272be7955e3ea40435187aac8db9219
-
SSDEEP
12288:NXm8Ag2J/HK7z0nAAXCnZd3LjKopJjVjmvKPLmSSthINfOlMg5PfR2bMl2g+3tm7:thAgDHAXCnvmO7zPLmSSoAln
Static task
static1
Behavioral task
behavioral1
Sample
fed71b10b7e687e2a79d50d54432825c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fed71b10b7e687e2a79d50d54432825c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.meehsom.com - Port:
587 - Username:
[email protected] - Password:
qUfwRVO4
Targets
-
-
Target
fed71b10b7e687e2a79d50d54432825c_JaffaCakes118
-
Size
840KB
-
MD5
fed71b10b7e687e2a79d50d54432825c
-
SHA1
271748f737c25ccde7403c57afc342a41bf7de99
-
SHA256
373d7750fb5c6c9a20651b2267fa23840da0a288f62bed277ec1560ba1d7bab7
-
SHA512
4704650ad4f0037e48de4c3f455568f0c8d0b0b4bb4082a5dce764fee8f3f28ff7713bc6ab4ee6571362da9c07e26f63b272be7955e3ea40435187aac8db9219
-
SSDEEP
12288:NXm8Ag2J/HK7z0nAAXCnZd3LjKopJjVjmvKPLmSSthINfOlMg5PfR2bMl2g+3tm7:thAgDHAXCnvmO7zPLmSSoAln
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-