General
-
Target
JaffaCakes118_6689fdbe509c7e4c437fd46c11203ee9a88b6eddc07e9f0306c45dd01ef57f7b
-
Size
667.6MB
-
Sample
241224-1cqm6axrfm
-
MD5
285e2be37e7cacf11ee3c3ff2d7c0609
-
SHA1
3f300e541eebe92a2f00d69b21910114e7b7fdfd
-
SHA256
6689fdbe509c7e4c437fd46c11203ee9a88b6eddc07e9f0306c45dd01ef57f7b
-
SHA512
ee8ca612077902d7248ad4b386944eebc26f2d7e21ef676884fbb6bf4a075e8e63ebe06612b4d6c7111fccd329c2ddee05a2265b93b9179a809adccbf881a4a1
-
SSDEEP
12288:mHmdkDwMD842VUKYMf+oCKTpEe9kmnCM2XcV3F2Wm5Kx8Oa:RkDV8FUKYMf+oCKTeeFWMv4oHa
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6689fdbe509c7e4c437fd46c11203ee9a88b6eddc07e9f0306c45dd01ef57f7b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6689fdbe509c7e4c437fd46c11203ee9a88b6eddc07e9f0306c45dd01ef57f7b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6357247770:AAGbyRDxRktEpxbHHmPhg_ZPzNOrZ1YuUyE/
Targets
-
-
Target
JaffaCakes118_6689fdbe509c7e4c437fd46c11203ee9a88b6eddc07e9f0306c45dd01ef57f7b
-
Size
667.6MB
-
MD5
285e2be37e7cacf11ee3c3ff2d7c0609
-
SHA1
3f300e541eebe92a2f00d69b21910114e7b7fdfd
-
SHA256
6689fdbe509c7e4c437fd46c11203ee9a88b6eddc07e9f0306c45dd01ef57f7b
-
SHA512
ee8ca612077902d7248ad4b386944eebc26f2d7e21ef676884fbb6bf4a075e8e63ebe06612b4d6c7111fccd329c2ddee05a2265b93b9179a809adccbf881a4a1
-
SSDEEP
12288:mHmdkDwMD842VUKYMf+oCKTpEe9kmnCM2XcV3F2Wm5Kx8Oa:RkDV8FUKYMf+oCKTeeFWMv4oHa
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-