General
-
Target
d67fc10f76f8972f3bc50b83993d4c06_JaffaCakes118
-
Size
409KB
-
Sample
240909-rqmc8avenc
-
MD5
d67fc10f76f8972f3bc50b83993d4c06
-
SHA1
8ba0380b9deeea8518ca06bd5ff0bc673df27cfe
-
SHA256
c486e1164e6673d53529376e153bbec949ea988da1a167e5dbb9f4cd0234fdef
-
SHA512
a9edc983a505cb4e15bda5660e8cc7c2991157b73512a52f1424b30b7a46bb468d01303da6b67fa6b9ac09305a1bcc891eb9c2a6f80474df0b07cd6ac5bbe22d
-
SSDEEP
6144:h/3LfSkSjc8f1p7CUrN9oKZqTdE2TX0SacNjjIdR7AcXoE5ARd27XdmIUw3RERKW:F+3LCUrN97+YmIUBLd2Liw3RERHl
Static task
static1
Behavioral task
behavioral1
Sample
d67fc10f76f8972f3bc50b83993d4c06_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d67fc10f76f8972f3bc50b83993d4c06_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
JuCbr%o3
Targets
-
-
Target
d67fc10f76f8972f3bc50b83993d4c06_JaffaCakes118
-
Size
409KB
-
MD5
d67fc10f76f8972f3bc50b83993d4c06
-
SHA1
8ba0380b9deeea8518ca06bd5ff0bc673df27cfe
-
SHA256
c486e1164e6673d53529376e153bbec949ea988da1a167e5dbb9f4cd0234fdef
-
SHA512
a9edc983a505cb4e15bda5660e8cc7c2991157b73512a52f1424b30b7a46bb468d01303da6b67fa6b9ac09305a1bcc891eb9c2a6f80474df0b07cd6ac5bbe22d
-
SSDEEP
6144:h/3LfSkSjc8f1p7CUrN9oKZqTdE2TX0SacNjjIdR7AcXoE5ARd27XdmIUw3RERKW:F+3LCUrN97+YmIUBLd2Liw3RERHl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-