General
-
Target
eb3bb19e79139d5ff456a6bdfbf0491e_JaffaCakes118
-
Size
523KB
-
Sample
240919-njllkawfpj
-
MD5
eb3bb19e79139d5ff456a6bdfbf0491e
-
SHA1
65264eca6544f09ffe8d4da32b99128431780e83
-
SHA256
e5fd3dbff62980d7f0a5abeb0f982352ba378eb76f372c3d7add7be144c61136
-
SHA512
874cdeda4ca5de77aa6b5b8bb460cd87f90b9689819d92a9ba16f1519fb0d8e6b9e29ea730378d08d41402c539429c27eb057bfb6e570f942faf49eb62a2465f
-
SSDEEP
12288:VlfW8V9geN1ezcpq8cosFbYgv3+lXXO6sIW5wTBZTJ3kQ:VZWvcq8W3+lHL939U
Behavioral task
behavioral1
Sample
eb3bb19e79139d5ff456a6bdfbf0491e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb3bb19e79139d5ff456a6bdfbf0491e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
wokoma10
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
wokoma10
Targets
-
-
Target
eb3bb19e79139d5ff456a6bdfbf0491e_JaffaCakes118
-
Size
523KB
-
MD5
eb3bb19e79139d5ff456a6bdfbf0491e
-
SHA1
65264eca6544f09ffe8d4da32b99128431780e83
-
SHA256
e5fd3dbff62980d7f0a5abeb0f982352ba378eb76f372c3d7add7be144c61136
-
SHA512
874cdeda4ca5de77aa6b5b8bb460cd87f90b9689819d92a9ba16f1519fb0d8e6b9e29ea730378d08d41402c539429c27eb057bfb6e570f942faf49eb62a2465f
-
SSDEEP
12288:VlfW8V9geN1ezcpq8cosFbYgv3+lXXO6sIW5wTBZTJ3kQ:VZWvcq8W3+lHL939U
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1