General
-
Target
ffd7c817323ded9ab17c4e020fbc8d98_JaffaCakes118
-
Size
670KB
-
Sample
240930-dqrfaavemr
-
MD5
ffd7c817323ded9ab17c4e020fbc8d98
-
SHA1
ac21d64b6cb3d0ba316db73b7e521c629f60fdec
-
SHA256
63f1f675dfba6996628ec3e6ed448f753786013fa4e626fbbf75128d0adee6f2
-
SHA512
a9c4bff19660b9605a4934abd1f32656bad9d36e3ddebe962a1f32c844c367b753b0058d841e3a355d7fcea50e0957464b5c33e50029c6f819faf0674a8d5369
-
SSDEEP
6144:4vQ+3HwOiVEJvzBdDALThiEOnHvCVvZE5J7uuUf7/5EA4QZzYKyFxg/qZfvbGiFP:4IoiMiD6KBZE3i75EIgxEobJy9NDN8w
Static task
static1
Behavioral task
behavioral1
Sample
ffd7c817323ded9ab17c4e020fbc8d98_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffd7c817323ded9ab17c4e020fbc8d98_JaffaCakes118.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.myremediez.com - Port:
587 - Username:
[email protected] - Password:
123123456 - Email To:
[email protected]
Targets
-
-
Target
ffd7c817323ded9ab17c4e020fbc8d98_JaffaCakes118
-
Size
670KB
-
MD5
ffd7c817323ded9ab17c4e020fbc8d98
-
SHA1
ac21d64b6cb3d0ba316db73b7e521c629f60fdec
-
SHA256
63f1f675dfba6996628ec3e6ed448f753786013fa4e626fbbf75128d0adee6f2
-
SHA512
a9c4bff19660b9605a4934abd1f32656bad9d36e3ddebe962a1f32c844c367b753b0058d841e3a355d7fcea50e0957464b5c33e50029c6f819faf0674a8d5369
-
SSDEEP
6144:4vQ+3HwOiVEJvzBdDALThiEOnHvCVvZE5J7uuUf7/5EA4QZzYKyFxg/qZfvbGiFP:4IoiMiD6KBZE3i75EIgxEobJy9NDN8w
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1