General
-
Target
ef16eaf3a4bd83231defd8ea5e3db940_JaffaCakes118
-
Size
464KB
-
Sample
240921-fdvy2swbjk
-
MD5
ef16eaf3a4bd83231defd8ea5e3db940
-
SHA1
bd4f3aceac0959c11db6db82fccdb3dfee3c0413
-
SHA256
cc91f115d2bae877c7b29b2e150743fdc1e3a7aa931829a3694ad3d621a9832f
-
SHA512
53a02e71196ec2a110760204f578eceb4907ab8e6ca01d10bf80666b4601903d4da3a8bf5f9c9a487107753dbc3c31559989d3629321ae7cd0c9c5d88e10c0e4
-
SSDEEP
12288:JZ/95om4doP4u3x6PwyEvpBk9WlJM3xnTeEEO9j6R:/8dKP6PepBkWlaBTeEEO9
Static task
static1
Behavioral task
behavioral1
Sample
ef16eaf3a4bd83231defd8ea5e3db940_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef16eaf3a4bd83231defd8ea5e3db940_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Rollingstone147
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Rollingstone147
Targets
-
-
Target
ef16eaf3a4bd83231defd8ea5e3db940_JaffaCakes118
-
Size
464KB
-
MD5
ef16eaf3a4bd83231defd8ea5e3db940
-
SHA1
bd4f3aceac0959c11db6db82fccdb3dfee3c0413
-
SHA256
cc91f115d2bae877c7b29b2e150743fdc1e3a7aa931829a3694ad3d621a9832f
-
SHA512
53a02e71196ec2a110760204f578eceb4907ab8e6ca01d10bf80666b4601903d4da3a8bf5f9c9a487107753dbc3c31559989d3629321ae7cd0c9c5d88e10c0e4
-
SSDEEP
12288:JZ/95om4doP4u3x6PwyEvpBk9WlJM3xnTeEEO9j6R:/8dKP6PepBkWlaBTeEEO9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1