General
-
Target
JaffaCakes118_6908cd5efe5473c75c9f2fc4a0b71557
-
Size
736KB
-
Sample
250107-r6bawsxmfl
-
MD5
6908cd5efe5473c75c9f2fc4a0b71557
-
SHA1
4e9bbcaf024a89dba6b9e2df0324b6903bdfa6f0
-
SHA256
5db2f2a9d86b6af21d70f614d0d918f22febf3ec5915e05d83b1fa791e4917d6
-
SHA512
bdfa188b32876f0f1fc0fa842fc964fcadedf024f2c10964e2fc093f2994d953ca7036c70c7d484c767a8d0a278c59ababb1ea851a1021bc7eb52beae5a47487
-
SSDEEP
12288:v0IlrxdlODrcYk6F3iaoRcUqxCVDn5PArUnjckdoJNuqoGFiYCsjx1frR3G9mb6m:v0IndlSI6F3iHSUqxCVM0lMuqoGVxB
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6908cd5efe5473c75c9f2fc4a0b71557.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6908cd5efe5473c75c9f2fc4a0b71557.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tccinfaes.com - Port:
587 - Username:
[email protected] - Password:
TccBps1427log - Email To:
[email protected]
Targets
-
-
Target
JaffaCakes118_6908cd5efe5473c75c9f2fc4a0b71557
-
Size
736KB
-
MD5
6908cd5efe5473c75c9f2fc4a0b71557
-
SHA1
4e9bbcaf024a89dba6b9e2df0324b6903bdfa6f0
-
SHA256
5db2f2a9d86b6af21d70f614d0d918f22febf3ec5915e05d83b1fa791e4917d6
-
SHA512
bdfa188b32876f0f1fc0fa842fc964fcadedf024f2c10964e2fc093f2994d953ca7036c70c7d484c767a8d0a278c59ababb1ea851a1021bc7eb52beae5a47487
-
SSDEEP
12288:v0IlrxdlODrcYk6F3iaoRcUqxCVDn5PArUnjckdoJNuqoGFiYCsjx1frR3G9mb6m:v0IndlSI6F3iHSUqxCVM0lMuqoGVxB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-