General
-
Target
JaffaCakes118_9e03276a3ccd1da3abc584204dfdf469
-
Size
1.0MB
-
Sample
250105-ml1mts1pew
-
MD5
9e03276a3ccd1da3abc584204dfdf469
-
SHA1
4292112e581499f7eb83f69653f6ee40ea3aa1c3
-
SHA256
aa619da09e3fec8627d139e888381ef1dfd8bc79a67b8f473be0ae2e40619c35
-
SHA512
301d58e9187294ca582ebb31df62367e4043e3811ecbb2c2457d89dd6a6892848dfa7014c6e17c371fa9c3942a95f288bef7e6f1e5a8b0fa353ced0c4a9233ea
-
SSDEEP
12288:+R/iAtfBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7ZLyzF3feqWu3m1CZHo1SUFs:+RqAtklIAvL3gnvq0A
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9e03276a3ccd1da3abc584204dfdf469.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9e03276a3ccd1da3abc584204dfdf469.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.aivazibis.com - Port:
587 - Username:
[email protected] - Password:
kp@BFLC1
Targets
-
-
Target
JaffaCakes118_9e03276a3ccd1da3abc584204dfdf469
-
Size
1.0MB
-
MD5
9e03276a3ccd1da3abc584204dfdf469
-
SHA1
4292112e581499f7eb83f69653f6ee40ea3aa1c3
-
SHA256
aa619da09e3fec8627d139e888381ef1dfd8bc79a67b8f473be0ae2e40619c35
-
SHA512
301d58e9187294ca582ebb31df62367e4043e3811ecbb2c2457d89dd6a6892848dfa7014c6e17c371fa9c3942a95f288bef7e6f1e5a8b0fa353ced0c4a9233ea
-
SSDEEP
12288:+R/iAtfBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7ZLyzF3feqWu3m1CZHo1SUFs:+RqAtklIAvL3gnvq0A
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-