General
-
Target
c8d3858bd9a46cf7d187ff76319de971_JaffaCakes118
-
Size
728KB
-
Sample
240829-pr17na1hkg
-
MD5
c8d3858bd9a46cf7d187ff76319de971
-
SHA1
82decde8004e36fb327d19a87c1e8b462e64f90f
-
SHA256
ef7f42f8ebfbe4e4067d95271ae8278a1aefe56250f0f34463c7a5ad263e3f72
-
SHA512
fd7d9c809753536240111dc2c7c53cd1db7a5dc19e10940cced6338164717361910c3353721041c73f8b0eba0aaf83613f183b5d46914a4f0fcd3e3565d51af6
-
SSDEEP
12288:GAuHRzXMlIGvLG9OgLrNMMfZppd3PSXdFXOzkiM:GAIRzXW6saMSeFXOz/
Static task
static1
Behavioral task
behavioral1
Sample
c8d3858bd9a46cf7d187ff76319de971_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8d3858bd9a46cf7d187ff76319de971_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
SAIRAM@98765
Targets
-
-
Target
c8d3858bd9a46cf7d187ff76319de971_JaffaCakes118
-
Size
728KB
-
MD5
c8d3858bd9a46cf7d187ff76319de971
-
SHA1
82decde8004e36fb327d19a87c1e8b462e64f90f
-
SHA256
ef7f42f8ebfbe4e4067d95271ae8278a1aefe56250f0f34463c7a5ad263e3f72
-
SHA512
fd7d9c809753536240111dc2c7c53cd1db7a5dc19e10940cced6338164717361910c3353721041c73f8b0eba0aaf83613f183b5d46914a4f0fcd3e3565d51af6
-
SSDEEP
12288:GAuHRzXMlIGvLG9OgLrNMMfZppd3PSXdFXOzkiM:GAIRzXW6saMSeFXOz/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1