General
-
Target
c93354839421ac1e3cdb47ea45236274_JaffaCakes118
-
Size
697KB
-
Sample
240829-t3tn6sshrm
-
MD5
c93354839421ac1e3cdb47ea45236274
-
SHA1
423b585b453d7c3efe0eb769c4d37c0127c7ae8e
-
SHA256
70006763ec3163b32c42b33f231f4f0a79eaa621fafc105f938c05fc8c823708
-
SHA512
5364ba8da4c2e4be222f39669a1b266b5a7212c55ec1cec107eebc298a10eac896aa61c014399165dc7655c4c8871a12bb01673fb5389675ef5ee01b7a7ba2e4
-
SSDEEP
12288:UCDqFHXLbK3B/GhIuLxyNnB/qF45Ni4Jsv8GC2Tj9Q0nelEyG8Gvx496B:UC/GBxyNZqwDDGtGlEyG8Cx
Static task
static1
Behavioral task
behavioral1
Sample
c93354839421ac1e3cdb47ea45236274_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c93354839421ac1e3cdb47ea45236274_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.nordpharm.ro - Port:
587 - Username:
[email protected] - Password:
Farmacie1
Targets
-
-
Target
c93354839421ac1e3cdb47ea45236274_JaffaCakes118
-
Size
697KB
-
MD5
c93354839421ac1e3cdb47ea45236274
-
SHA1
423b585b453d7c3efe0eb769c4d37c0127c7ae8e
-
SHA256
70006763ec3163b32c42b33f231f4f0a79eaa621fafc105f938c05fc8c823708
-
SHA512
5364ba8da4c2e4be222f39669a1b266b5a7212c55ec1cec107eebc298a10eac896aa61c014399165dc7655c4c8871a12bb01673fb5389675ef5ee01b7a7ba2e4
-
SSDEEP
12288:UCDqFHXLbK3B/GhIuLxyNnB/qF45Ni4Jsv8GC2Tj9Q0nelEyG8Gvx496B:UC/GBxyNZqwDDGtGlEyG8Cx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-