General
-
Target
JaffaCakes118_eec88dee7c195e191ba88effa7fc2fc16261eef36b9dc88bb93b04798ea7d864
-
Size
700.6MB
-
Sample
241229-jmak9awqgn
-
MD5
c2d0efc83be80a1fc88471a87a75bb30
-
SHA1
1395449b6694aee1b33adf7b8f2bff1935a60e77
-
SHA256
eec88dee7c195e191ba88effa7fc2fc16261eef36b9dc88bb93b04798ea7d864
-
SHA512
adaf65a1248eb9b22a36e17a3b91ef0932599ac5083f6853579d16228fd05520ede6fcf8cc88c320fa820669629ba554aed61d9ac47fd51a42c677d1fb888c2d
-
SSDEEP
12288:UotzLwrJTYCjdaQZN8IIRaxhwxUzWI+BLkcQfDQroe5K5x2HAKLSu:itFdaQZNrI1UznedQrioe5NgKB
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_eec88dee7c195e191ba88effa7fc2fc16261eef36b9dc88bb93b04798ea7d864.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_eec88dee7c195e191ba88effa7fc2fc16261eef36b9dc88bb93b04798ea7d864.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5954474519:AAEGnfW1mRvGRxq-zIAvwJfpKEbhLLiqVaM/
Targets
-
-
Target
JaffaCakes118_eec88dee7c195e191ba88effa7fc2fc16261eef36b9dc88bb93b04798ea7d864
-
Size
700.6MB
-
MD5
c2d0efc83be80a1fc88471a87a75bb30
-
SHA1
1395449b6694aee1b33adf7b8f2bff1935a60e77
-
SHA256
eec88dee7c195e191ba88effa7fc2fc16261eef36b9dc88bb93b04798ea7d864
-
SHA512
adaf65a1248eb9b22a36e17a3b91ef0932599ac5083f6853579d16228fd05520ede6fcf8cc88c320fa820669629ba554aed61d9ac47fd51a42c677d1fb888c2d
-
SSDEEP
12288:UotzLwrJTYCjdaQZN8IIRaxhwxUzWI+BLkcQfDQroe5K5x2HAKLSu:itFdaQZNrI1UznedQrioe5NgKB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-