General
-
Target
dd34d67dd51995a69d89f8e3c10f4d8c_JaffaCakes118
-
Size
623KB
-
Sample
240912-22z4kazfmq
-
MD5
dd34d67dd51995a69d89f8e3c10f4d8c
-
SHA1
ee8b35798bac9ddc82f111eec49708d0b1ee541f
-
SHA256
39d6538d17f4e0983148dde9c80565090d7eb512ad3ea31d9fecc3c9d1530208
-
SHA512
a0fd468dfddfd08e56481c73ff3b3a24a50e7292a5606568219587ac83a1b87e27258ef8863d16d61d19618029709e346dcbe82f600f6c9cb8d4f64fe168e309
-
SSDEEP
12288:/WHfdI046Mnq0UnsO5lJkKzUvoPUu9YpoKUJF5VjgGDlRaZ0Ix7hkb6nat:/Ua237VRwrxtnat
Static task
static1
Behavioral task
behavioral1
Sample
dd34d67dd51995a69d89f8e3c10f4d8c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd34d67dd51995a69d89f8e3c10f4d8c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aldhiyafainteriors.com - Port:
587 - Username:
[email protected] - Password:
dhiyafa@987
Targets
-
-
Target
dd34d67dd51995a69d89f8e3c10f4d8c_JaffaCakes118
-
Size
623KB
-
MD5
dd34d67dd51995a69d89f8e3c10f4d8c
-
SHA1
ee8b35798bac9ddc82f111eec49708d0b1ee541f
-
SHA256
39d6538d17f4e0983148dde9c80565090d7eb512ad3ea31d9fecc3c9d1530208
-
SHA512
a0fd468dfddfd08e56481c73ff3b3a24a50e7292a5606568219587ac83a1b87e27258ef8863d16d61d19618029709e346dcbe82f600f6c9cb8d4f64fe168e309
-
SSDEEP
12288:/WHfdI046Mnq0UnsO5lJkKzUvoPUu9YpoKUJF5VjgGDlRaZ0Ix7hkb6nat:/Ua237VRwrxtnat
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-