General
-
Target
29f786e2130af67df21cb5810e181ee7_JaffaCakes118
-
Size
1.1MB
-
Sample
241009-dzwrcsvamf
-
MD5
29f786e2130af67df21cb5810e181ee7
-
SHA1
0d90ab0a8e2b0d24a416cb0c198d2f98ba8bea93
-
SHA256
8cf5bee9b6bb22024d08818c93083105e43033e5e3889492cd6161eb15f6d2b2
-
SHA512
b0689c0e1ef6d1806f9e3869fcd2511e30c7d3dac689735e8242b1032072a4b472f7b3f2145acf9625cb5fe5bb19689f080d1fa0a959749244ba144ca48afc4c
-
SSDEEP
24576:uo2A4dQY/G61yhgte8X4DD5r5B2FfCTBDi/NJKao7:xbDY/F1yhg7a1reKmJKl7
Static task
static1
Behavioral task
behavioral1
Sample
29f786e2130af67df21cb5810e181ee7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29f786e2130af67df21cb5810e181ee7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.digicon.com.mx/ - Port:
21 - Username:
[email protected] - Password:
sailor@123
Targets
-
-
Target
29f786e2130af67df21cb5810e181ee7_JaffaCakes118
-
Size
1.1MB
-
MD5
29f786e2130af67df21cb5810e181ee7
-
SHA1
0d90ab0a8e2b0d24a416cb0c198d2f98ba8bea93
-
SHA256
8cf5bee9b6bb22024d08818c93083105e43033e5e3889492cd6161eb15f6d2b2
-
SHA512
b0689c0e1ef6d1806f9e3869fcd2511e30c7d3dac689735e8242b1032072a4b472f7b3f2145acf9625cb5fe5bb19689f080d1fa0a959749244ba144ca48afc4c
-
SSDEEP
24576:uo2A4dQY/G61yhgte8X4DD5r5B2FfCTBDi/NJKao7:xbDY/F1yhg7a1reKmJKl7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1