General
-
Target
d5173d29b7006d8b2a68bcf7f33ffeba_JaffaCakes118
-
Size
377KB
-
Sample
240908-zypsbaxglg
-
MD5
d5173d29b7006d8b2a68bcf7f33ffeba
-
SHA1
84de5a76081c8e3b75445d3d435378208862aafa
-
SHA256
691c2a33264227cf53264d3087a8651f204448d57af3ea7c74e95da03b273bdb
-
SHA512
0996e234e0e036245df23ce1815688900f98d9796140f1f6206dc5da40d939aa8031cbf981ed40c343f36210e3982fd64c94beecc9910964aa42e7e9aaf03044
-
SSDEEP
6144:7Vn8Y/2+3x5spUN1yY0zyZLgeoqn9onD4EpvrX:758WhWmNEYOyF1x9onD4Eh
Static task
static1
Behavioral task
behavioral1
Sample
d5173d29b7006d8b2a68bcf7f33ffeba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5173d29b7006d8b2a68bcf7f33ffeba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
elsecreto2019
Targets
-
-
Target
d5173d29b7006d8b2a68bcf7f33ffeba_JaffaCakes118
-
Size
377KB
-
MD5
d5173d29b7006d8b2a68bcf7f33ffeba
-
SHA1
84de5a76081c8e3b75445d3d435378208862aafa
-
SHA256
691c2a33264227cf53264d3087a8651f204448d57af3ea7c74e95da03b273bdb
-
SHA512
0996e234e0e036245df23ce1815688900f98d9796140f1f6206dc5da40d939aa8031cbf981ed40c343f36210e3982fd64c94beecc9910964aa42e7e9aaf03044
-
SSDEEP
6144:7Vn8Y/2+3x5spUN1yY0zyZLgeoqn9onD4EpvrX:758WhWmNEYOyF1x9onD4Eh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-