General
-
Target
JaffaCakes118_7ca3c2ad1da3bd5514be7054b2af0a78
-
Size
540KB
-
Sample
250107-2dywla1qc1
-
MD5
7ca3c2ad1da3bd5514be7054b2af0a78
-
SHA1
bc96a6c3f9f442f2d52a8ec7e48a7d010b6d767b
-
SHA256
5bad96dda4ae65a4b81d53e3ddd51eaa0181e07c5dea64b1d1bfb561b900dc53
-
SHA512
c4b71df1e2e40c6f9a5489f7b2f5f9935053b524d99a24f0c3869d0a9013a2441ac3b6c6f8f991b8df89fadba9890f946a4e7b5e3fbbd6f476d7fb9f8b2658c6
-
SSDEEP
12288:PeSLRfmUi2iNml1gYzY/IfefmPOLdjyRMDK+qBOvx:JLBmUi1ktzIc8BRDK+5x
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ca3c2ad1da3bd5514be7054b2af0a78.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7ca3c2ad1da3bd5514be7054b2af0a78.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
CHINADUA@#asx122
Targets
-
-
Target
JaffaCakes118_7ca3c2ad1da3bd5514be7054b2af0a78
-
Size
540KB
-
MD5
7ca3c2ad1da3bd5514be7054b2af0a78
-
SHA1
bc96a6c3f9f442f2d52a8ec7e48a7d010b6d767b
-
SHA256
5bad96dda4ae65a4b81d53e3ddd51eaa0181e07c5dea64b1d1bfb561b900dc53
-
SHA512
c4b71df1e2e40c6f9a5489f7b2f5f9935053b524d99a24f0c3869d0a9013a2441ac3b6c6f8f991b8df89fadba9890f946a4e7b5e3fbbd6f476d7fb9f8b2658c6
-
SSDEEP
12288:PeSLRfmUi2iNml1gYzY/IfefmPOLdjyRMDK+qBOvx:JLBmUi1ktzIc8BRDK+5x
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-