General
-
Target
dd634978dddca325b16ad844dfdaca7b_JaffaCakes118
-
Size
379KB
-
Sample
240913-blhlgawfng
-
MD5
dd634978dddca325b16ad844dfdaca7b
-
SHA1
d09c2d4945bd78a30b7376aceb8662d396980e19
-
SHA256
02cacd6026e8ad2157e15edd10b12b2b4a76762104a6551cfd861ae302ccaf8f
-
SHA512
e28c3b6bb7951944505fce6647813fe971544e3007079018f5a130a5ea8660e1180f8a9f08b7c03b47ed0d81c27bfdb99eb333a6e9a540c05f40d9ca16b6a8a5
-
SSDEEP
6144:TVn8Y/2+3x5spUN1yY0zyZSTioqn9onD4Epv:T58WhWmNEYOyxx9onD4Eh
Static task
static1
Behavioral task
behavioral1
Sample
dd634978dddca325b16ad844dfdaca7b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd634978dddca325b16ad844dfdaca7b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
elsecreto2019
Targets
-
-
Target
dd634978dddca325b16ad844dfdaca7b_JaffaCakes118
-
Size
379KB
-
MD5
dd634978dddca325b16ad844dfdaca7b
-
SHA1
d09c2d4945bd78a30b7376aceb8662d396980e19
-
SHA256
02cacd6026e8ad2157e15edd10b12b2b4a76762104a6551cfd861ae302ccaf8f
-
SHA512
e28c3b6bb7951944505fce6647813fe971544e3007079018f5a130a5ea8660e1180f8a9f08b7c03b47ed0d81c27bfdb99eb333a6e9a540c05f40d9ca16b6a8a5
-
SSDEEP
6144:TVn8Y/2+3x5spUN1yY0zyZSTioqn9onD4Epv:T58WhWmNEYOyxx9onD4Eh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-