General
-
Target
f7b17bb57612e00afb7f7c10b23fba8d_JaffaCakes118
-
Size
431KB
-
Sample
240926-gd82catcpe
-
MD5
f7b17bb57612e00afb7f7c10b23fba8d
-
SHA1
9a1a359906db1cdec9a2538cb5a6956985384bf3
-
SHA256
ca5571dd39e2f7364b198e5d3a7a6fa034edb8c06d4c9ea2e96041f3e53196d9
-
SHA512
a20d842b62fbf9f7aeb2a05d3b9726ce6e0112f03b72c885e3d1af087f38652ff19098abc1a7debb15267de9d92e53d36a4ae61d00a31e888f9316a6041c3700
-
SSDEEP
6144:J5iXq4NYHjLS1hxUeYALIfv7vIVVxJ10C7zd6J8alAJC+C0:Ox2HUhOeYALI3TIjxrTzeXc
Static task
static1
Behavioral task
behavioral1
Sample
f7b17bb57612e00afb7f7c10b23fba8d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f7b17bb57612e00afb7f7c10b23fba8d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
elsecreto2019
Targets
-
-
Target
f7b17bb57612e00afb7f7c10b23fba8d_JaffaCakes118
-
Size
431KB
-
MD5
f7b17bb57612e00afb7f7c10b23fba8d
-
SHA1
9a1a359906db1cdec9a2538cb5a6956985384bf3
-
SHA256
ca5571dd39e2f7364b198e5d3a7a6fa034edb8c06d4c9ea2e96041f3e53196d9
-
SHA512
a20d842b62fbf9f7aeb2a05d3b9726ce6e0112f03b72c885e3d1af087f38652ff19098abc1a7debb15267de9d92e53d36a4ae61d00a31e888f9316a6041c3700
-
SSDEEP
6144:J5iXq4NYHjLS1hxUeYALIfv7vIVVxJ10C7zd6J8alAJC+C0:Ox2HUhOeYALI3TIjxrTzeXc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-