General
-
Target
e0cd76df54576d98a23dd74052da970b_JaffaCakes118
-
Size
533KB
-
Sample
240914-xd3sbszajr
-
MD5
e0cd76df54576d98a23dd74052da970b
-
SHA1
1eb9956b44efff07183c0b0c6c008a5d0b3d8e94
-
SHA256
fb366ecda1b1b244d00abca67abc3708c26477c34a20c4e1833c7b4cf501ca35
-
SHA512
9fcf5d1844892567e975f530e4c271fa135ab5d87d9e20623cc9a73c72770598f4d4c27cf8b9bfd9239c076d5167532d8d536fa18df0646c37eeea4f36e7919e
-
SSDEEP
12288:CzYLjP6eP9KqR12Ea/FkEHWytz/kuyXf2Jgb:E+jP6+KQ4EaNWytz4XfE2
Static task
static1
Behavioral task
behavioral1
Sample
e0cd76df54576d98a23dd74052da970b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0cd76df54576d98a23dd74052da970b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.clark-relaince.com - Port:
587 - Username:
[email protected] - Password:
fQtZJSp7
Targets
-
-
Target
e0cd76df54576d98a23dd74052da970b_JaffaCakes118
-
Size
533KB
-
MD5
e0cd76df54576d98a23dd74052da970b
-
SHA1
1eb9956b44efff07183c0b0c6c008a5d0b3d8e94
-
SHA256
fb366ecda1b1b244d00abca67abc3708c26477c34a20c4e1833c7b4cf501ca35
-
SHA512
9fcf5d1844892567e975f530e4c271fa135ab5d87d9e20623cc9a73c72770598f4d4c27cf8b9bfd9239c076d5167532d8d536fa18df0646c37eeea4f36e7919e
-
SSDEEP
12288:CzYLjP6eP9KqR12Ea/FkEHWytz/kuyXf2Jgb:E+jP6+KQ4EaNWytz4XfE2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-