General
-
Target
fbd8775388f073b1f9ebcf318fcdf4d2_JaffaCakes118
-
Size
378KB
-
Sample
240928-jvf31axdmh
-
MD5
fbd8775388f073b1f9ebcf318fcdf4d2
-
SHA1
b312842f579a982abbbb7f82845a64013f22fb66
-
SHA256
efc4bcae066a28a746e0b6dd93a7c900d4e7cf3b6ba756f1913fca026e25d2f5
-
SHA512
a398ac649a7741a3b775ec11ad9db724f665bd0b473125012666f0f4db376eb3c22ce036af6e3b734cfe42d9d00c9059489c9d329518bef25f74dc18947f1879
-
SSDEEP
6144:NVn8Y/2+3x5spUN1yY0zyZhIoqn9onD4Epvk:N58WhWmNEYOyEx9onD4Eh
Static task
static1
Behavioral task
behavioral1
Sample
fbd8775388f073b1f9ebcf318fcdf4d2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbd8775388f073b1f9ebcf318fcdf4d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
elsecreto2019
Targets
-
-
Target
fbd8775388f073b1f9ebcf318fcdf4d2_JaffaCakes118
-
Size
378KB
-
MD5
fbd8775388f073b1f9ebcf318fcdf4d2
-
SHA1
b312842f579a982abbbb7f82845a64013f22fb66
-
SHA256
efc4bcae066a28a746e0b6dd93a7c900d4e7cf3b6ba756f1913fca026e25d2f5
-
SHA512
a398ac649a7741a3b775ec11ad9db724f665bd0b473125012666f0f4db376eb3c22ce036af6e3b734cfe42d9d00c9059489c9d329518bef25f74dc18947f1879
-
SSDEEP
6144:NVn8Y/2+3x5spUN1yY0zyZhIoqn9onD4Epvk:N58WhWmNEYOyEx9onD4Eh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-