General
-
Target
JaffaCakes118_fd3eba12a7152d8db63aabe18cc4dabf
-
Size
482KB
-
Sample
250111-lbpl5svjey
-
MD5
fd3eba12a7152d8db63aabe18cc4dabf
-
SHA1
60993033d749b95b89604cb776f5606dbb77fc47
-
SHA256
3bd0fd9a08763582606b71a86c2bb4a4fc178559e2ac4e3b9ac999bdc95d65b1
-
SHA512
d0ccbfbeb6e603984100d002885ef3aff22c1196b7a2819872f9abbe8450c538d6cda6f719be4c42d981df9b48b2b1f670bd828885db32382cb69f2150e15eba
-
SSDEEP
12288:vUi2iNf4iDBfgew83Kh+wcUJMIs1AX3qZ/gyQBz:vUi1aiDaE6hUUJX92zU
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fd3eba12a7152d8db63aabe18cc4dabf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fd3eba12a7152d8db63aabe18cc4dabf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Everest10
Targets
-
-
Target
JaffaCakes118_fd3eba12a7152d8db63aabe18cc4dabf
-
Size
482KB
-
MD5
fd3eba12a7152d8db63aabe18cc4dabf
-
SHA1
60993033d749b95b89604cb776f5606dbb77fc47
-
SHA256
3bd0fd9a08763582606b71a86c2bb4a4fc178559e2ac4e3b9ac999bdc95d65b1
-
SHA512
d0ccbfbeb6e603984100d002885ef3aff22c1196b7a2819872f9abbe8450c538d6cda6f719be4c42d981df9b48b2b1f670bd828885db32382cb69f2150e15eba
-
SSDEEP
12288:vUi2iNf4iDBfgew83Kh+wcUJMIs1AX3qZ/gyQBz:vUi1aiDaE6hUUJX92zU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-