General
-
Target
34fa2448e36300f2954bacfe1ed89026_JaffaCakes118
-
Size
594KB
-
Sample
240330-gd9mwahg2v
-
MD5
34fa2448e36300f2954bacfe1ed89026
-
SHA1
44f69b57ef3eccd46e77bf3a34103f9991d48ad1
-
SHA256
74f29e0c765b24b3a34f3f430328fc58688ae0d8c7ef55297cd9d3b6dfeae8de
-
SHA512
849714a100c9b234d8e77a3f1d4b2c145ebb05930c5f1e465f783275dbf11222f01b2f348a7e3ec0b78c0b7f4b879e21688dc578c7be538758a31932b859ca2a
-
SSDEEP
12288:ByUi2iNb7YQlAOWtXVFVxz7PwLEmjvJ7tIC/Ppuv+uuV:UUi15YQlAvtXfVpPw/jhGQuv+u
Static task
static1
Behavioral task
behavioral1
Sample
34fa2448e36300f2954bacfe1ed89026_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
34fa2448e36300f2954bacfe1ed89026_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
india@123
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
india@123
Targets
-
-
Target
34fa2448e36300f2954bacfe1ed89026_JaffaCakes118
-
Size
594KB
-
MD5
34fa2448e36300f2954bacfe1ed89026
-
SHA1
44f69b57ef3eccd46e77bf3a34103f9991d48ad1
-
SHA256
74f29e0c765b24b3a34f3f430328fc58688ae0d8c7ef55297cd9d3b6dfeae8de
-
SHA512
849714a100c9b234d8e77a3f1d4b2c145ebb05930c5f1e465f783275dbf11222f01b2f348a7e3ec0b78c0b7f4b879e21688dc578c7be538758a31932b859ca2a
-
SSDEEP
12288:ByUi2iNb7YQlAOWtXVFVxz7PwLEmjvJ7tIC/Ppuv+uuV:UUi15YQlAvtXfVpPw/jhGQuv+u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1