General
-
Target
JaffaCakes118_8195933d86c3d1c32779574cee331e37
-
Size
1.3MB
-
Sample
250105-bhsbhayjfl
-
MD5
8195933d86c3d1c32779574cee331e37
-
SHA1
6ca5c19d8d6d6268b0c9e04e149e7d8ec5ca4197
-
SHA256
a9993c32ba563caa1d5189a138ebd607fa15cfbbf9dd6124f11215f9803cc036
-
SHA512
ad4ee8dcd1ed22d1dac2f97f60cba69f89605873b0ca465bf9df644ee8721e22bad5fd2305c5f230f42497e2997637bdb56abbb58073061f731665d7f5c7212f
-
SSDEEP
12288:PHLwA5XPo7/fBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7ZLyszVNA87b8CoirI8:PH8A5A7klIGs087PoitB+JS6afj7
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8195933d86c3d1c32779574cee331e37.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8195933d86c3d1c32779574cee331e37.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.yillyenterprise.com - Port:
587 - Username:
[email protected] - Password:
Iseeyou.com
Targets
-
-
Target
JaffaCakes118_8195933d86c3d1c32779574cee331e37
-
Size
1.3MB
-
MD5
8195933d86c3d1c32779574cee331e37
-
SHA1
6ca5c19d8d6d6268b0c9e04e149e7d8ec5ca4197
-
SHA256
a9993c32ba563caa1d5189a138ebd607fa15cfbbf9dd6124f11215f9803cc036
-
SHA512
ad4ee8dcd1ed22d1dac2f97f60cba69f89605873b0ca465bf9df644ee8721e22bad5fd2305c5f230f42497e2997637bdb56abbb58073061f731665d7f5c7212f
-
SSDEEP
12288:PHLwA5XPo7/fBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7ZLyszVNA87b8CoirI8:PH8A5A7klIGs087PoitB+JS6afj7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-