General
-
Target
f4becb408d750ad2afbf21c109bf3b47_JaffaCakes118
-
Size
823KB
-
Sample
240417-brfztsbc3y
-
MD5
f4becb408d750ad2afbf21c109bf3b47
-
SHA1
8ac72cb52d1a7b5e898bb4af2116002da9ee917b
-
SHA256
d018a7658d8dcb21b5a371e6df3207b14d97a1d9c564565f923d5941894624d0
-
SHA512
8ecfbbf42329b0373540d7cfc7e53c54f9aae6a50a0958952195e31f046503bfee544d13cbd7d252a47a6026706eacd1135bddbe4d1175984b0a028268499a71
-
SSDEEP
12288:nS2y7gqyVknlb8uYhkOH7eNcHqIucsgHs1KPzx50+xT/qR:nAnyVklb853hnugMqd50+o
Static task
static1
Behavioral task
behavioral1
Sample
f4becb408d750ad2afbf21c109bf3b47_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4becb408d750ad2afbf21c109bf3b47_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
office12#
Targets
-
-
Target
f4becb408d750ad2afbf21c109bf3b47_JaffaCakes118
-
Size
823KB
-
MD5
f4becb408d750ad2afbf21c109bf3b47
-
SHA1
8ac72cb52d1a7b5e898bb4af2116002da9ee917b
-
SHA256
d018a7658d8dcb21b5a371e6df3207b14d97a1d9c564565f923d5941894624d0
-
SHA512
8ecfbbf42329b0373540d7cfc7e53c54f9aae6a50a0958952195e31f046503bfee544d13cbd7d252a47a6026706eacd1135bddbe4d1175984b0a028268499a71
-
SSDEEP
12288:nS2y7gqyVknlb8uYhkOH7eNcHqIucsgHs1KPzx50+xT/qR:nAnyVklb853hnugMqd50+o
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-