General
-
Target
JaffaCakes118_28a035971a05543b5d089a5fbb4093da
-
Size
457KB
-
Sample
241231-t4exeayphw
-
MD5
28a035971a05543b5d089a5fbb4093da
-
SHA1
dff98a3bf2db10f7349af8d716cd5fcce288a026
-
SHA256
80c7c965b9fa6731d6fde32a8a2f9c03cfb13f7ff3eb68360adab6acf32ea4aa
-
SHA512
9a22b5e01a788f0655507f5fc6c7eb9d013fc812fd5a96a5688112b4f6f364cec1bf14ca9687ab595cf654fc41150c52dbb8ee6ce52a4d1631afb2217aeb803c
-
SSDEEP
12288:WepTHjsJ1MNKeRWVmEG+j4qY1ZkrSLgy/:TTDsYYeRWIJ1ZC/y/
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_28a035971a05543b5d089a5fbb4093da.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_28a035971a05543b5d089a5fbb4093da.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1968500169:AAHyFfTHMojfg0XGRFraaMexoQIFtILzuxU/sendDocument
Targets
-
-
Target
JaffaCakes118_28a035971a05543b5d089a5fbb4093da
-
Size
457KB
-
MD5
28a035971a05543b5d089a5fbb4093da
-
SHA1
dff98a3bf2db10f7349af8d716cd5fcce288a026
-
SHA256
80c7c965b9fa6731d6fde32a8a2f9c03cfb13f7ff3eb68360adab6acf32ea4aa
-
SHA512
9a22b5e01a788f0655507f5fc6c7eb9d013fc812fd5a96a5688112b4f6f364cec1bf14ca9687ab595cf654fc41150c52dbb8ee6ce52a4d1631afb2217aeb803c
-
SSDEEP
12288:WepTHjsJ1MNKeRWVmEG+j4qY1ZkrSLgy/:TTDsYYeRWIJ1ZC/y/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-