General
-
Target
e135611c006868bd0c7e57609cb028a4_JaffaCakes118
-
Size
742KB
-
Sample
240914-2y6ryasakb
-
MD5
e135611c006868bd0c7e57609cb028a4
-
SHA1
ff2ff1d23825037a964b7855ec89f0517f81f10e
-
SHA256
4e80b14fa776dc36f1f23893fad5a527490b91a61a83d99309710429ce5d9dc8
-
SHA512
78e8c7ff32ec3cba9d92cbdbdd445f0c84423704ec435cb873c7d96ae60cdf23f9c6dbe65b23754fc5bcb25795125c45db5d2146fe72ab56aa6b42935140e0ea
-
SSDEEP
12288:72m9mygck7g4++RWR7imOxL80hHtlYwkdHDgaSMRZUW+dwHUwyz:S2TgBtmRfOV3HtmwkpMa9LX+SHrK
Static task
static1
Behavioral task
behavioral1
Sample
e135611c006868bd0c7e57609cb028a4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e135611c006868bd0c7e57609cb028a4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.spamora.net - Port:
587 - Username:
[email protected] - Password:
Emotion1
Extracted
Protocol: smtp- Host:
mail.spamora.net - Port:
587 - Username:
[email protected] - Password:
Emotion1
Targets
-
-
Target
e135611c006868bd0c7e57609cb028a4_JaffaCakes118
-
Size
742KB
-
MD5
e135611c006868bd0c7e57609cb028a4
-
SHA1
ff2ff1d23825037a964b7855ec89f0517f81f10e
-
SHA256
4e80b14fa776dc36f1f23893fad5a527490b91a61a83d99309710429ce5d9dc8
-
SHA512
78e8c7ff32ec3cba9d92cbdbdd445f0c84423704ec435cb873c7d96ae60cdf23f9c6dbe65b23754fc5bcb25795125c45db5d2146fe72ab56aa6b42935140e0ea
-
SSDEEP
12288:72m9mygck7g4++RWR7imOxL80hHtlYwkdHDgaSMRZUW+dwHUwyz:S2TgBtmRfOV3HtmwkpMa9LX+SHrK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-