General
-
Target
edff585d4793c8d312195a07fa377c58_JaffaCakes118
-
Size
378KB
-
Sample
240920-t3zkeswdpf
-
MD5
edff585d4793c8d312195a07fa377c58
-
SHA1
c16a7e3f52afc2c3927db875df3bec7d6d835344
-
SHA256
6e427ef05ea69011294442225137a849c1a5c70234529dc8c60b798b5d108781
-
SHA512
5268c202983e9e8f420c2349d97b8c054ea9e9100fd8b436ba904c165ba0d34f11c9ced69935530fa396c38a08ca1b2c8367157b49855aedb80ced92c3c85589
-
SSDEEP
6144:bcVn8Y/2+3x5spUN1yY0zyZgkoqn9onD4EpvurP:Q58WhWmNEYOyekx9onD4Ehu7
Static task
static1
Behavioral task
behavioral1
Sample
edff585d4793c8d312195a07fa377c58_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edff585d4793c8d312195a07fa377c58_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
elsecreto2019
Targets
-
-
Target
edff585d4793c8d312195a07fa377c58_JaffaCakes118
-
Size
378KB
-
MD5
edff585d4793c8d312195a07fa377c58
-
SHA1
c16a7e3f52afc2c3927db875df3bec7d6d835344
-
SHA256
6e427ef05ea69011294442225137a849c1a5c70234529dc8c60b798b5d108781
-
SHA512
5268c202983e9e8f420c2349d97b8c054ea9e9100fd8b436ba904c165ba0d34f11c9ced69935530fa396c38a08ca1b2c8367157b49855aedb80ced92c3c85589
-
SSDEEP
6144:bcVn8Y/2+3x5spUN1yY0zyZgkoqn9onD4EpvurP:Q58WhWmNEYOyekx9onD4Ehu7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-