General
-
Target
JaffaCakes118_a1feec2e3c9c7e398cc4407b612c13a4
-
Size
609KB
-
Sample
250108-qry8qs1qay
-
MD5
a1feec2e3c9c7e398cc4407b612c13a4
-
SHA1
b74ac3c543beae0a79ba106c4472c7fbe89ab2ce
-
SHA256
f76003744a65fae7f373d38c79bb9ec49e0377eea97e6628d94cffbea1437f61
-
SHA512
8f81e25ad0251cf4314730c5de36b39b5233c948a442ff6592b61558961ba93c54dee0ab09be1aaaa43b765da1ce98c7c638fa9a3d2acb71269230dec5add0cc
-
SSDEEP
12288:niBlqpUExmIshw7qf49AqIZeCtFXdWJ9didSBLQpFvkNgNCc:niBlqppchYqg98ltFNcqQBL0k6
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a1feec2e3c9c7e398cc4407b612c13a4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a1feec2e3c9c7e398cc4407b612c13a4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dm-teh.com - Port:
587 - Username:
[email protected] - Password:
Vm@(O;CO.vEQ - Email To:
[email protected]
Targets
-
-
Target
JaffaCakes118_a1feec2e3c9c7e398cc4407b612c13a4
-
Size
609KB
-
MD5
a1feec2e3c9c7e398cc4407b612c13a4
-
SHA1
b74ac3c543beae0a79ba106c4472c7fbe89ab2ce
-
SHA256
f76003744a65fae7f373d38c79bb9ec49e0377eea97e6628d94cffbea1437f61
-
SHA512
8f81e25ad0251cf4314730c5de36b39b5233c948a442ff6592b61558961ba93c54dee0ab09be1aaaa43b765da1ce98c7c638fa9a3d2acb71269230dec5add0cc
-
SSDEEP
12288:niBlqpUExmIshw7qf49AqIZeCtFXdWJ9didSBLQpFvkNgNCc:niBlqppchYqg98ltFNcqQBL0k6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-