General
-
Target
ec8d7174d7903f33b4ef30cc94864651_JaffaCakes118
-
Size
938KB
-
Sample
240920-bmfs9s1dmc
-
MD5
ec8d7174d7903f33b4ef30cc94864651
-
SHA1
022890717bdbbf46289f4a28ab614a4941083111
-
SHA256
6acc19951dbf6135e0e1e4887f0cfd05ba25be970c2441e3a6be49d60dfc1f47
-
SHA512
296e840f30366dbd4c499cec05e5391b087659482a2557b1fc2eb71caf3dee5d05bdd28df9a5586f243e28724fc9d034ab1898cbaab45d719dc1c87be3cea0a9
-
SSDEEP
24576:qyB5sjP6+kiZsCH1FlViWhlLA4Eopy+Cv0MIixDOkwS6qWznqqr:upsAFlkWgJopyDJIi8xS3Wz
Static task
static1
Behavioral task
behavioral1
Sample
ec8d7174d7903f33b4ef30cc94864651_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec8d7174d7903f33b4ef30cc94864651_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
http://airplpetech.com/xmw/inc/d65465a967e1f7.php
Targets
-
-
Target
ec8d7174d7903f33b4ef30cc94864651_JaffaCakes118
-
Size
938KB
-
MD5
ec8d7174d7903f33b4ef30cc94864651
-
SHA1
022890717bdbbf46289f4a28ab614a4941083111
-
SHA256
6acc19951dbf6135e0e1e4887f0cfd05ba25be970c2441e3a6be49d60dfc1f47
-
SHA512
296e840f30366dbd4c499cec05e5391b087659482a2557b1fc2eb71caf3dee5d05bdd28df9a5586f243e28724fc9d034ab1898cbaab45d719dc1c87be3cea0a9
-
SSDEEP
24576:qyB5sjP6+kiZsCH1FlViWhlLA4Eopy+Cv0MIixDOkwS6qWznqqr:upsAFlkWgJopyDJIi8xS3Wz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-