General
-
Target
ef737a50b718f9d4c3331f926edd8e8c_JaffaCakes118
-
Size
636KB
-
Sample
240921-ktwyhatfpc
-
MD5
ef737a50b718f9d4c3331f926edd8e8c
-
SHA1
10a6cf02f6ebbd93212782122800e4978172d579
-
SHA256
19b7ae6956a38825ac143952843f6e046c642a9dc635e18d4f84dcff4568c142
-
SHA512
8f1aff36697d0d7544d96bc3ed949f79d8627c45328fec300bcfcb91f8378a7be62d271e51adc36f6d63fc2e62c157b006dfe9291125a040cd2b03a17053ba81
-
SSDEEP
12288:6C+Pupk1AE4++rM4FdPEbw+Sf6ygbL7EKzIlxoQ7aIrDv8E0FKIa:NUAE4RrJFdPrmuIQWIrDZMna
Static task
static1
Behavioral task
behavioral1
Sample
ef737a50b718f9d4c3331f926edd8e8c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef737a50b718f9d4c3331f926edd8e8c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
poundsboy24
Targets
-
-
Target
ef737a50b718f9d4c3331f926edd8e8c_JaffaCakes118
-
Size
636KB
-
MD5
ef737a50b718f9d4c3331f926edd8e8c
-
SHA1
10a6cf02f6ebbd93212782122800e4978172d579
-
SHA256
19b7ae6956a38825ac143952843f6e046c642a9dc635e18d4f84dcff4568c142
-
SHA512
8f1aff36697d0d7544d96bc3ed949f79d8627c45328fec300bcfcb91f8378a7be62d271e51adc36f6d63fc2e62c157b006dfe9291125a040cd2b03a17053ba81
-
SSDEEP
12288:6C+Pupk1AE4++rM4FdPEbw+Sf6ygbL7EKzIlxoQ7aIrDv8E0FKIa:NUAE4RrJFdPrmuIQWIrDZMna
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-