General
-
Target
ef422573f33168438c898d671ffa1198_JaffaCakes118
-
Size
853KB
-
Sample
240921-hhyxlszcjl
-
MD5
ef422573f33168438c898d671ffa1198
-
SHA1
f4b8f95c9b57d34ea67cb31172607ea89beeef35
-
SHA256
9923a33884694f30672b7c76b5c85ebe60f8d40787738119be4dc160fd2ffd50
-
SHA512
b5c19091fd3afc08f88d44603ab9c1a7bf11a13126ef4d2c3017a4bb05173720e5a40f3ea2fdb397ce56fe10ff477f68cd68632de46aae9967863fb441fe0823
-
SSDEEP
12288:hku5Gmo2BiBTh8Mtd1P5N8QScL2VphXXh01xWnX3LmYr3Gz/0ex1MPoCo:hXMMib8MtJN8sGb2O7fGpx1MBo
Static task
static1
Behavioral task
behavioral1
Sample
ef422573f33168438c898d671ffa1198_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ef422573f33168438c898d671ffa1198_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
@@Io419090@@
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
@@Io419090@@
Targets
-
-
Target
ef422573f33168438c898d671ffa1198_JaffaCakes118
-
Size
853KB
-
MD5
ef422573f33168438c898d671ffa1198
-
SHA1
f4b8f95c9b57d34ea67cb31172607ea89beeef35
-
SHA256
9923a33884694f30672b7c76b5c85ebe60f8d40787738119be4dc160fd2ffd50
-
SHA512
b5c19091fd3afc08f88d44603ab9c1a7bf11a13126ef4d2c3017a4bb05173720e5a40f3ea2fdb397ce56fe10ff477f68cd68632de46aae9967863fb441fe0823
-
SSDEEP
12288:hku5Gmo2BiBTh8Mtd1P5N8QScL2VphXXh01xWnX3LmYr3Gz/0ex1MPoCo:hXMMib8MtJN8sGb2O7fGpx1MBo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-