General
-
Target
259fc1e0bdda287e77aafc32cb0f31f8_JaffaCakes118
-
Size
1.2MB
-
Sample
241008-z6938a1hlc
-
MD5
259fc1e0bdda287e77aafc32cb0f31f8
-
SHA1
db7ffb437663ccf250a3a754eb3be7858c996b54
-
SHA256
8a433dd716320992f912d3a373bf37dc263f2a2d46231b563246ef9e1a0a2f1c
-
SHA512
e66420b53e69b7078d03075367c1ef7821d492e83a1e656d530c25a3b59b486b981a81b8e337789e181f3ccdf696bfd26f83d8c5ad9f17e3ddb9b988f1bb0fc4
-
SSDEEP
24576:6j8/OcyawskdMNj1pTlev9yNQZIAZxgrrq:6YfhvmPsrO
Static task
static1
Behavioral task
behavioral1
Sample
259fc1e0bdda287e77aafc32cb0f31f8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
259fc1e0bdda287e77aafc32cb0f31f8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://files.000webhost.com/ - Port:
21 - Username:
zinco - Password:
computer147
Targets
-
-
Target
259fc1e0bdda287e77aafc32cb0f31f8_JaffaCakes118
-
Size
1.2MB
-
MD5
259fc1e0bdda287e77aafc32cb0f31f8
-
SHA1
db7ffb437663ccf250a3a754eb3be7858c996b54
-
SHA256
8a433dd716320992f912d3a373bf37dc263f2a2d46231b563246ef9e1a0a2f1c
-
SHA512
e66420b53e69b7078d03075367c1ef7821d492e83a1e656d530c25a3b59b486b981a81b8e337789e181f3ccdf696bfd26f83d8c5ad9f17e3ddb9b988f1bb0fc4
-
SSDEEP
24576:6j8/OcyawskdMNj1pTlev9yNQZIAZxgrrq:6YfhvmPsrO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-