General
-
Target
JaffaCakes118_0009b1f46b5cfa09222aa4b798d5366c61d4f040c24262dc8a32a96c0d2de5fc
-
Size
700.7MB
-
Sample
241226-vl64ls1qdt
-
MD5
deba55361a2e878d9b1b2da159bd2c8f
-
SHA1
0cbb0747d687ca87f00c4ad008c1720c6b111244
-
SHA256
0009b1f46b5cfa09222aa4b798d5366c61d4f040c24262dc8a32a96c0d2de5fc
-
SHA512
368c0ec6bfa52f92680eaac37a4d4d172d8e47658c0b467327852fb50c03a3a1b8dd6cccdb242c9962e3484d637f5782ab1b7ddfe92f7da334d0d3192f8634c2
-
SSDEEP
12288:gvV+s1bSQT6tjjdB4LwauumsA+khXI3CJk3fiOT1pc19L2me7wJttA:gtpBuruWefiCqab7wJQ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0009b1f46b5cfa09222aa4b798d5366c61d4f040c24262dc8a32a96c0d2de5fc.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0009b1f46b5cfa09222aa4b798d5366c61d4f040c24262dc8a32a96c0d2de5fc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5268976687:AAFVn0p7E2gEOnhpsNJOFeUNsuaE1sW24jE/
Targets
-
-
Target
JaffaCakes118_0009b1f46b5cfa09222aa4b798d5366c61d4f040c24262dc8a32a96c0d2de5fc
-
Size
700.7MB
-
MD5
deba55361a2e878d9b1b2da159bd2c8f
-
SHA1
0cbb0747d687ca87f00c4ad008c1720c6b111244
-
SHA256
0009b1f46b5cfa09222aa4b798d5366c61d4f040c24262dc8a32a96c0d2de5fc
-
SHA512
368c0ec6bfa52f92680eaac37a4d4d172d8e47658c0b467327852fb50c03a3a1b8dd6cccdb242c9962e3484d637f5782ab1b7ddfe92f7da334d0d3192f8634c2
-
SSDEEP
12288:gvV+s1bSQT6tjjdB4LwauumsA+khXI3CJk3fiOT1pc19L2me7wJttA:gtpBuruWefiCqab7wJQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-