General
-
Target
daba34ee91d71e27825d0e34dca5aa1c_JaffaCakes118
-
Size
382KB
-
Sample
240911-tlyxkazgmf
-
MD5
daba34ee91d71e27825d0e34dca5aa1c
-
SHA1
e18bb4bbf084e39d8f12765bdeefee694783a55b
-
SHA256
06b9ec5bcbddaf19ad375e5f7216b7fbcc0a854867d301a2e13b683b5908ec6c
-
SHA512
dcfe1b3d05a1ac88929d96478e02c235c66b900c5a52a470aeb0b922ba0f671f7980a205ba791c09eecbdb9e93e51afe76447462ec6d4d53987719de12a944dc
-
SSDEEP
6144:3K6g8ITLkw7HKIBHyFguPnPZZWzPLSQjMrNabcgM8u5hOVHrK/C62wRi/KEmz7ao:3KLkw2i4L3ZiCr4bcgMLOVHma7ipKo
Static task
static1
Behavioral task
behavioral1
Sample
daba34ee91d71e27825d0e34dca5aa1c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daba34ee91d71e27825d0e34dca5aa1c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server252.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
)nf%CWKJ[FaW
Targets
-
-
Target
daba34ee91d71e27825d0e34dca5aa1c_JaffaCakes118
-
Size
382KB
-
MD5
daba34ee91d71e27825d0e34dca5aa1c
-
SHA1
e18bb4bbf084e39d8f12765bdeefee694783a55b
-
SHA256
06b9ec5bcbddaf19ad375e5f7216b7fbcc0a854867d301a2e13b683b5908ec6c
-
SHA512
dcfe1b3d05a1ac88929d96478e02c235c66b900c5a52a470aeb0b922ba0f671f7980a205ba791c09eecbdb9e93e51afe76447462ec6d4d53987719de12a944dc
-
SSDEEP
6144:3K6g8ITLkw7HKIBHyFguPnPZZWzPLSQjMrNabcgM8u5hOVHrK/C62wRi/KEmz7ao:3KLkw2i4L3ZiCr4bcgMLOVHma7ipKo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2