General
-
Target
0535d61c633b6dac3e59ec955c2ed86b_JaffaCakes118
-
Size
1.3MB
-
Sample
241001-k66ngawame
-
MD5
0535d61c633b6dac3e59ec955c2ed86b
-
SHA1
92441762bc9c5bdf261b62590837af1158762cbb
-
SHA256
6bc441927968c65a2b9b072d1aa40ee2f17a095f2de8c2a802e64399afaf40f3
-
SHA512
951efc726866c8997e6b86269ea8f8b6cfb0bea0faabeeecc9773cad8c6023376c407505193a7be4e64853c25f56a9f4a4e6720bc99db1d169ba078540ca993d
-
SSDEEP
24576:vjTUTc/NguVO/o5Y7N+qbmsbkh6wmB5Be5SfWVlJ1cKaXLK4r3f2:7TUTcbVO/o27kEhkgF5BekfWVlLUPr3
Static task
static1
Behavioral task
behavioral1
Sample
0535d61c633b6dac3e59ec955c2ed86b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0535d61c633b6dac3e59ec955c2ed86b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
netwire
betterday.duckdns.org:5345
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
agenttesla
https://api.telegram.org/bot1698102386:AAHWYbuf-rLmgfOsAgCnA_t8ncjPXSF5S8c/sendDocument
Targets
-
-
Target
0535d61c633b6dac3e59ec955c2ed86b_JaffaCakes118
-
Size
1.3MB
-
MD5
0535d61c633b6dac3e59ec955c2ed86b
-
SHA1
92441762bc9c5bdf261b62590837af1158762cbb
-
SHA256
6bc441927968c65a2b9b072d1aa40ee2f17a095f2de8c2a802e64399afaf40f3
-
SHA512
951efc726866c8997e6b86269ea8f8b6cfb0bea0faabeeecc9773cad8c6023376c407505193a7be4e64853c25f56a9f4a4e6720bc99db1d169ba078540ca993d
-
SSDEEP
24576:vjTUTc/NguVO/o5Y7N+qbmsbkh6wmB5Be5SfWVlJ1cKaXLK4r3f2:7TUTcbVO/o27kEhkgF5BekfWVlLUPr3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
NetWire RAT payload
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2