General
-
Target
e3ccf2ebcde0ac1e90b472f536d5ae9f_JaffaCakes118
-
Size
543KB
-
Sample
240916-cb7chstcng
-
MD5
e3ccf2ebcde0ac1e90b472f536d5ae9f
-
SHA1
8bf60eb66e488ce603a5f2b4bf5b469993cde809
-
SHA256
c3372683261b447261620810696af6f9f7250ec7022b82c81895051039effcbd
-
SHA512
22202ea47d4214f9ddcdfeb9e0d562fc5bc9ae28b744b6741466721e583e136c5251727adc8cd4a9c32f7794217e14e4380ae96fb6f90bf42bf505bb7669f1e7
-
SSDEEP
12288:8Rk6LdGRv2zv1gQbq4zprTZoUITnzq8jlTY/r1q:8xGY2QVprTZoHTzrjlTMr1q
Static task
static1
Behavioral task
behavioral1
Sample
e3ccf2ebcde0ac1e90b472f536d5ae9f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3ccf2ebcde0ac1e90b472f536d5ae9f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thanhphet.asia - Port:
587 - Username:
[email protected] - Password:
Daddyhandsome@1234 - Email To:
[email protected]
Targets
-
-
Target
e3ccf2ebcde0ac1e90b472f536d5ae9f_JaffaCakes118
-
Size
543KB
-
MD5
e3ccf2ebcde0ac1e90b472f536d5ae9f
-
SHA1
8bf60eb66e488ce603a5f2b4bf5b469993cde809
-
SHA256
c3372683261b447261620810696af6f9f7250ec7022b82c81895051039effcbd
-
SHA512
22202ea47d4214f9ddcdfeb9e0d562fc5bc9ae28b744b6741466721e583e136c5251727adc8cd4a9c32f7794217e14e4380ae96fb6f90bf42bf505bb7669f1e7
-
SSDEEP
12288:8Rk6LdGRv2zv1gQbq4zprTZoUITnzq8jlTY/r1q:8xGY2QVprTZoHTzrjlTMr1q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-