General
-
Target
2748045d542d232ac39ebb7e9bc94c16_JaffaCakes118
-
Size
475KB
-
Sample
241008-3ve1gszekk
-
MD5
2748045d542d232ac39ebb7e9bc94c16
-
SHA1
c538591916470d37aaf838dd49b23c7028f7c51c
-
SHA256
5eda1a970e778c1a561598fdd6986e0a4d926b80627b12dfc10e01134a1f4f63
-
SHA512
64080da588204da20184a9d6f2537df26ede1b9785bb71a96c1a8cf09e878d2dfa60b7471c4dafc5807845524174b04066c890be7e77b1652c3d1967265325b6
-
SSDEEP
12288:E3taORhPVcmcjwNRkwfJptUO76UJ4roU7h7AN3gB+M9eZaPRsXvo0AKqgqVa:E3kOTKUYAC9UAoShsKB+ML/A
Static task
static1
Behavioral task
behavioral1
Sample
2748045d542d232ac39ebb7e9bc94c16_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2748045d542d232ac39ebb7e9bc94c16_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dianaglobalmandiri.com - Port:
587 - Username:
[email protected] - Password:
Batam2019
Targets
-
-
Target
2748045d542d232ac39ebb7e9bc94c16_JaffaCakes118
-
Size
475KB
-
MD5
2748045d542d232ac39ebb7e9bc94c16
-
SHA1
c538591916470d37aaf838dd49b23c7028f7c51c
-
SHA256
5eda1a970e778c1a561598fdd6986e0a4d926b80627b12dfc10e01134a1f4f63
-
SHA512
64080da588204da20184a9d6f2537df26ede1b9785bb71a96c1a8cf09e878d2dfa60b7471c4dafc5807845524174b04066c890be7e77b1652c3d1967265325b6
-
SSDEEP
12288:E3taORhPVcmcjwNRkwfJptUO76UJ4roU7h7AN3gB+M9eZaPRsXvo0AKqgqVa:E3kOTKUYAC9UAoShsKB+ML/A
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-