General
-
Target
dbc9260d15a78fbca519139ac312d3da_JaffaCakes118
-
Size
434KB
-
Sample
240912-eq7yps1anp
-
MD5
dbc9260d15a78fbca519139ac312d3da
-
SHA1
a69da485e9f1f4ac01ffa9dc14c4a29fb0f91edb
-
SHA256
6bacf77670384a05f1d69cb99036ad040616b48f2aa42c269b0e7b007ded1a6d
-
SHA512
160bfbaf46da0ad08a1ee09b251ad6a2340d3e6de3f465182153171dbfe89f14601266b2db3c363eaa79d23d29fd2823418b5fbf2161ac9e601b66aec50d103c
-
SSDEEP
6144:DMVH0XmQm/h0qEtNRociAnPtwjq1qjqwiE282T7DFI7O6qDpjnKqysR4tvUjPpPq:DrXmQm/hPE/fiAnPtkZ2WR+prKTsUUk
Static task
static1
Behavioral task
behavioral1
Sample
dbc9260d15a78fbca519139ac312d3da_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbc9260d15a78fbca519139ac312d3da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.totallyanonymous.com - Port:
587 - Username:
[email protected] - Password:
R$i;Kx25esuR
Targets
-
-
Target
dbc9260d15a78fbca519139ac312d3da_JaffaCakes118
-
Size
434KB
-
MD5
dbc9260d15a78fbca519139ac312d3da
-
SHA1
a69da485e9f1f4ac01ffa9dc14c4a29fb0f91edb
-
SHA256
6bacf77670384a05f1d69cb99036ad040616b48f2aa42c269b0e7b007ded1a6d
-
SHA512
160bfbaf46da0ad08a1ee09b251ad6a2340d3e6de3f465182153171dbfe89f14601266b2db3c363eaa79d23d29fd2823418b5fbf2161ac9e601b66aec50d103c
-
SSDEEP
6144:DMVH0XmQm/h0qEtNRociAnPtwjq1qjqwiE282T7DFI7O6qDpjnKqysR4tvUjPpPq:DrXmQm/hPE/fiAnPtkZ2WR+prKTsUUk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1