General
-
Target
JaffaCakes118_5f1a5b9f4fda1483f9409035d19a270f
-
Size
548KB
-
Sample
250107-m45phaykfy
-
MD5
5f1a5b9f4fda1483f9409035d19a270f
-
SHA1
3fa2c9986bb4b99853126ab5591cc6d35ad3489a
-
SHA256
141f6635e9a73f078448f505b92eeb333ce841e4ce781995b75844e448ece1a6
-
SHA512
dd05faa74447536a598023886a3d3923ffe548f2543cc391a3781e8bfb798e0f4700d537d10fcfe1c3cd5b0424b4c4a5f65a2631011d2cd8d5356386f320b70f
-
SSDEEP
12288:38yQ4RkOVwJ7v7U2knCWVQdx+i3+70Ky7KTBiOva:38yhJVwt7Bl+i3+70LUBB
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5f1a5b9f4fda1483f9409035d19a270f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5f1a5b9f4fda1483f9409035d19a270f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dairysystems.co.ke - Port:
587 - Username:
[email protected] - Password:
2019@systems
Targets
-
-
Target
JaffaCakes118_5f1a5b9f4fda1483f9409035d19a270f
-
Size
548KB
-
MD5
5f1a5b9f4fda1483f9409035d19a270f
-
SHA1
3fa2c9986bb4b99853126ab5591cc6d35ad3489a
-
SHA256
141f6635e9a73f078448f505b92eeb333ce841e4ce781995b75844e448ece1a6
-
SHA512
dd05faa74447536a598023886a3d3923ffe548f2543cc391a3781e8bfb798e0f4700d537d10fcfe1c3cd5b0424b4c4a5f65a2631011d2cd8d5356386f320b70f
-
SSDEEP
12288:38yQ4RkOVwJ7v7U2knCWVQdx+i3+70Ky7KTBiOva:38yhJVwt7Bl+i3+70LUBB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-