General
-
Target
ef0aafefa653a36a33a9a8469f1e8159_JaffaCakes118
-
Size
531KB
-
Sample
240921-eq9gjavbjl
-
MD5
ef0aafefa653a36a33a9a8469f1e8159
-
SHA1
00abdec221e84a67140e2ae239f4c64a9213b211
-
SHA256
b796ebc23a355b8fbd29552b2ff7142f09617c25a30a33d5a92626f69e337d48
-
SHA512
bb778a37da1b9b325da9719195830f5e2877d4fbffda74927b8baff5e714dd0c73b3f3b19c567554191bb105779d229a029e2da3f82bc9831a755c2d06c2c72f
-
SSDEEP
12288:KiTzYG1w0wODUfOg5ZodnvtcZCnRn0LdAA:KiTz/tUfjwnvhnRngA
Static task
static1
Behavioral task
behavioral1
Sample
ef0aafefa653a36a33a9a8469f1e8159_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef0aafefa653a36a33a9a8469f1e8159_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail3.dynamail.asia - Port:
587 - Username:
[email protected] - Password:
Fehm.718907M
Targets
-
-
Target
ef0aafefa653a36a33a9a8469f1e8159_JaffaCakes118
-
Size
531KB
-
MD5
ef0aafefa653a36a33a9a8469f1e8159
-
SHA1
00abdec221e84a67140e2ae239f4c64a9213b211
-
SHA256
b796ebc23a355b8fbd29552b2ff7142f09617c25a30a33d5a92626f69e337d48
-
SHA512
bb778a37da1b9b325da9719195830f5e2877d4fbffda74927b8baff5e714dd0c73b3f3b19c567554191bb105779d229a029e2da3f82bc9831a755c2d06c2c72f
-
SSDEEP
12288:KiTzYG1w0wODUfOg5ZodnvtcZCnRn0LdAA:KiTz/tUfjwnvhnRngA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-