General
-
Target
JaffaCakes118_c045e02b6d2b77a095bc22e7bb2ddc95
-
Size
675KB
-
Sample
250109-ggl1zssrhl
-
MD5
c045e02b6d2b77a095bc22e7bb2ddc95
-
SHA1
b29b7bd8096bcf3626d5440b1fb0f43664c180e7
-
SHA256
ec5ff522902b6f42aaa9abd95593aa881db6219afa9cd41c566300b4097bbfa4
-
SHA512
275c9b59279a32fbbc88309ca6ad9a61d4af9a40284ea6ff6d010c91cc8c64533b2bff940ced02429dcb9dcca61e08ccc90d7fbea18633a0bdda7c3cdab14067
-
SSDEEP
12288:RZqxsXHfROuQLBiUUNnLsB+RgNCwaiDURQaTxY:iqX/RlQqejNdaiQRQatY
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c045e02b6d2b77a095bc22e7bb2ddc95.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.abaamap.com.mx - Port:
587 - Username:
[email protected] - Password:
6.9)bx6}m*k}
Targets
-
-
Target
JaffaCakes118_c045e02b6d2b77a095bc22e7bb2ddc95
-
Size
675KB
-
MD5
c045e02b6d2b77a095bc22e7bb2ddc95
-
SHA1
b29b7bd8096bcf3626d5440b1fb0f43664c180e7
-
SHA256
ec5ff522902b6f42aaa9abd95593aa881db6219afa9cd41c566300b4097bbfa4
-
SHA512
275c9b59279a32fbbc88309ca6ad9a61d4af9a40284ea6ff6d010c91cc8c64533b2bff940ced02429dcb9dcca61e08ccc90d7fbea18633a0bdda7c3cdab14067
-
SSDEEP
12288:RZqxsXHfROuQLBiUUNnLsB+RgNCwaiDURQaTxY:iqX/RlQqejNdaiQRQatY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-