General
-
Target
db45193c0f7beea46dda2ee72efa46a9_JaffaCakes118
-
Size
553KB
-
Sample
240911-1lmmvsvdre
-
MD5
db45193c0f7beea46dda2ee72efa46a9
-
SHA1
00a1877bcc8b94ab78e9e56b3df67bcbece186cd
-
SHA256
3e0399c730996386f895fb276f727a0dd3095ae40c59ca11b56ed55ae8207285
-
SHA512
c34260d0ae9e371eb6c6987f9ccae2db21cf3b239046812aad75887808cee6eda12501249c42c7ceb51fd45ef023fe4f44be6c896f864b7f0f460074877a2957
-
SSDEEP
12288:ksj4nN3zLB/4eym+XDCtdwpV1xijwwmxKUOJSZVoe3lvWRV:kCkN3H2eyj+tGp3wNiNpVoe3lvCV
Static task
static1
Behavioral task
behavioral1
Sample
db45193c0f7beea46dda2ee72efa46a9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db45193c0f7beea46dda2ee72efa46a9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.flsrnidth.com - Port:
587 - Username:
[email protected] - Password:
BZ^(npqQ6vPH
Targets
-
-
Target
db45193c0f7beea46dda2ee72efa46a9_JaffaCakes118
-
Size
553KB
-
MD5
db45193c0f7beea46dda2ee72efa46a9
-
SHA1
00a1877bcc8b94ab78e9e56b3df67bcbece186cd
-
SHA256
3e0399c730996386f895fb276f727a0dd3095ae40c59ca11b56ed55ae8207285
-
SHA512
c34260d0ae9e371eb6c6987f9ccae2db21cf3b239046812aad75887808cee6eda12501249c42c7ceb51fd45ef023fe4f44be6c896f864b7f0f460074877a2957
-
SSDEEP
12288:ksj4nN3zLB/4eym+XDCtdwpV1xijwwmxKUOJSZVoe3lvWRV:kCkN3H2eyj+tGp3wNiNpVoe3lvCV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-