General
-
Target
e63e0896e16d8cac0ca1a7f677712349_JaffaCakes118
-
Size
373KB
-
Sample
240917-hdmnsazapp
-
MD5
e63e0896e16d8cac0ca1a7f677712349
-
SHA1
ad9b6aa1fb2545155eac807c45fabb0e36194518
-
SHA256
5c3531182b31bc6f5e80934c705154bcb5ae553daf78005984628f3736ec5ec2
-
SHA512
5f5e3f6b3b06fcf10d8f832e5d0dd607ef4b177b1af6081e455264b480328cb295c4af564b651b9142edf5e7637f764f1b401fbb1ec74806e7e7eba514655fc3
-
SSDEEP
6144:9ZJZj3XBjlkq27zgxRcWoqn9onD4EpvFu:99zZo7cvZx9onD4Eh
Static task
static1
Behavioral task
behavioral1
Sample
e63e0896e16d8cac0ca1a7f677712349_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e63e0896e16d8cac0ca1a7f677712349_JaffaCakes118.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
elsecreto2019
Targets
-
-
Target
e63e0896e16d8cac0ca1a7f677712349_JaffaCakes118
-
Size
373KB
-
MD5
e63e0896e16d8cac0ca1a7f677712349
-
SHA1
ad9b6aa1fb2545155eac807c45fabb0e36194518
-
SHA256
5c3531182b31bc6f5e80934c705154bcb5ae553daf78005984628f3736ec5ec2
-
SHA512
5f5e3f6b3b06fcf10d8f832e5d0dd607ef4b177b1af6081e455264b480328cb295c4af564b651b9142edf5e7637f764f1b401fbb1ec74806e7e7eba514655fc3
-
SSDEEP
6144:9ZJZj3XBjlkq27zgxRcWoqn9onD4EpvFu:99zZo7cvZx9onD4Eh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-