General

  • Target

    fb3ec34679854d670b13c127b7ee43a2_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240928-bt7wbszcnk

  • MD5

    fb3ec34679854d670b13c127b7ee43a2

  • SHA1

    0aec381d8410fa41904f22e03deed04eb7a26ce1

  • SHA256

    85852c127c5e69bd9ecf58eb50ed7a628ca2de1250ff8f8b266973ec4c32fd6d

  • SHA512

    d12d7dac9f3383e8f05fdc5686d441f86f2df5a2ad1b5e1a77edbe05d3648fd9052b0e855e56217ef0a8f2db53e3221aa8001d8fbe801e0e6c3291cee0a9b464

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1Hom2KXMmHaQoDbReyGiItqC7cVQpDkKpp3ioh6ypZpTQxX:Rh+ZkldoPK8YaQokyGiINIVQpDkKpxDg

Malware Config

Targets

    • Target

      fb3ec34679854d670b13c127b7ee43a2_JaffaCakes118

    • Size

      1.5MB

    • MD5

      fb3ec34679854d670b13c127b7ee43a2

    • SHA1

      0aec381d8410fa41904f22e03deed04eb7a26ce1

    • SHA256

      85852c127c5e69bd9ecf58eb50ed7a628ca2de1250ff8f8b266973ec4c32fd6d

    • SHA512

      d12d7dac9f3383e8f05fdc5686d441f86f2df5a2ad1b5e1a77edbe05d3648fd9052b0e855e56217ef0a8f2db53e3221aa8001d8fbe801e0e6c3291cee0a9b464

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1Hom2KXMmHaQoDbReyGiItqC7cVQpDkKpp3ioh6ypZpTQxX:Rh+ZkldoPK8YaQokyGiINIVQpDkKpxDg

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops startup file

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks