General
-
Target
eddfc5c0d54df839168961eca8eac04b_JaffaCakes118
-
Size
766KB
-
Sample
240920-sqt9hatejl
-
MD5
eddfc5c0d54df839168961eca8eac04b
-
SHA1
a9e4cf4442241da6cfe70c64a396dabcdb365aef
-
SHA256
86cdc28aa7b220cdf21710c3be636e7cb5f1dbb57b9dd27048113a02883ef9c8
-
SHA512
5711a3b2ef519a562b930560a697e667301389644f3f7b308eefa827a54b0daeb5525c3290547f3092cbabbadcd294ee721100b64007ac9aa2e44bcf9e30f760
-
SSDEEP
12288:kOLVE2/mYsY0GxRh7pHqKju+hltPxCT6fzBdEENo8RTzqN6W05N5wCauEii1B2jJ:ksVE2/mYsmJ7pKKyeltPxC+fzor8RTzt
Static task
static1
Behavioral task
behavioral1
Sample
eddfc5c0d54df839168961eca8eac04b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eddfc5c0d54df839168961eca8eac04b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.blt-co.com - Port:
587 - Username:
[email protected] - Password:
=5yFb77EJsg!
Targets
-
-
Target
eddfc5c0d54df839168961eca8eac04b_JaffaCakes118
-
Size
766KB
-
MD5
eddfc5c0d54df839168961eca8eac04b
-
SHA1
a9e4cf4442241da6cfe70c64a396dabcdb365aef
-
SHA256
86cdc28aa7b220cdf21710c3be636e7cb5f1dbb57b9dd27048113a02883ef9c8
-
SHA512
5711a3b2ef519a562b930560a697e667301389644f3f7b308eefa827a54b0daeb5525c3290547f3092cbabbadcd294ee721100b64007ac9aa2e44bcf9e30f760
-
SSDEEP
12288:kOLVE2/mYsY0GxRh7pHqKju+hltPxCT6fzBdEENo8RTzqN6W05N5wCauEii1B2jJ:ksVE2/mYsmJ7pKKyeltPxC+fzor8RTzt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-