General
-
Target
f92972c4d6cb28b350e6fa0ce897ebf2_JaffaCakes118
-
Size
922KB
-
Sample
240419-bfwadaca65
-
MD5
f92972c4d6cb28b350e6fa0ce897ebf2
-
SHA1
edb8413f28ccda47f892f0ecdb85d80f5412cd93
-
SHA256
c3e1fb98c978c699c79b569c14c7bc41fce17a1846e9d66757ad579e3c97ceda
-
SHA512
0d761dac89dba988763cb86bf756f0ea17f3e2eee1badf545491bb8b56090a955e0b6b10c11835638256ac7cb69c73e2ca489db35480271bc7f3c90e4e5e4ccb
-
SSDEEP
24576:n/NJx7rhdt9doELR7Gf9LvaCqQ2VYJUEKlCW3:/bFftPo17aCoYJUEKlCW
Static task
static1
Behavioral task
behavioral1
Sample
f92972c4d6cb28b350e6fa0ce897ebf2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f92972c4d6cb28b350e6fa0ce897ebf2_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vibranthonda.co - Port:
587 - Username:
parts@vibranthonda.co - Password:
RADHE@123
Targets
-
-
Target
f92972c4d6cb28b350e6fa0ce897ebf2_JaffaCakes118
-
Size
922KB
-
MD5
f92972c4d6cb28b350e6fa0ce897ebf2
-
SHA1
edb8413f28ccda47f892f0ecdb85d80f5412cd93
-
SHA256
c3e1fb98c978c699c79b569c14c7bc41fce17a1846e9d66757ad579e3c97ceda
-
SHA512
0d761dac89dba988763cb86bf756f0ea17f3e2eee1badf545491bb8b56090a955e0b6b10c11835638256ac7cb69c73e2ca489db35480271bc7f3c90e4e5e4ccb
-
SSDEEP
24576:n/NJx7rhdt9doELR7Gf9LvaCqQ2VYJUEKlCW3:/bFftPo17aCoYJUEKlCW
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1