General
-
Target
412321287fef0b7a10f378d6fc3f3ccd_JaffaCakes118
-
Size
416KB
-
Sample
240330-wp6gxsbc8v
-
MD5
412321287fef0b7a10f378d6fc3f3ccd
-
SHA1
99e67585c0374ee54dfb9ffffddf4945f73f1b4f
-
SHA256
73a586d7ca79fec396b175728166d48322e002cf6b9b4b2aabda668378b38304
-
SHA512
02c2e4fa8a06ca69f72d0a6855acf6d47d26512be15c3bf4633c2698b00e9c06ea277640a4c35e218d6540e8fb8d9706533512884522c12e7986a5dfd53976cd
-
SSDEEP
12288:xT7iEe6CIWPCMi2le6l1IpKdRO8jkSYgG:x7iwOPCMi286QKdRaSZ
Static task
static1
Behavioral task
behavioral1
Sample
412321287fef0b7a10f378d6fc3f3ccd_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
412321287fef0b7a10f378d6fc3f3ccd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lahaciendamontericogrande.com.pe - Port:
587 - Username:
[email protected] - Password:
e$$
Targets
-
-
Target
412321287fef0b7a10f378d6fc3f3ccd_JaffaCakes118
-
Size
416KB
-
MD5
412321287fef0b7a10f378d6fc3f3ccd
-
SHA1
99e67585c0374ee54dfb9ffffddf4945f73f1b4f
-
SHA256
73a586d7ca79fec396b175728166d48322e002cf6b9b4b2aabda668378b38304
-
SHA512
02c2e4fa8a06ca69f72d0a6855acf6d47d26512be15c3bf4633c2698b00e9c06ea277640a4c35e218d6540e8fb8d9706533512884522c12e7986a5dfd53976cd
-
SSDEEP
12288:xT7iEe6CIWPCMi2le6l1IpKdRO8jkSYgG:x7iwOPCMi286QKdRaSZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-