General
-
Target
2a706154bfd5a7bfddb0924141dc6aeb_JaffaCakes118
-
Size
723KB
-
Sample
241009-ej1k2sxhkf
-
MD5
2a706154bfd5a7bfddb0924141dc6aeb
-
SHA1
1cb771526a3f1a3b2bded9f4c43fd70613df0108
-
SHA256
62bdf39d7109c7e7f16a675e23be3085efe10aef41cff698f83a18427a57c02d
-
SHA512
66dd9aff42f5f3311338ef18c3a11a75204f97a9fe23f0380e844da9e5fd4792405bfaffb43fe739cc56e6ab127d4bd2a3563ecc004d94fe0a5b4c7b1572ef5f
-
SSDEEP
12288:xtSV942iNeHK7zTe97KsbvOhPQTgYnpXEXF8PbRAh6v8hOR9fH9Ybe5TV+5bN+m7:xtSVu1bfWUPEgYxE+PtAMlYq5xcAm
Static task
static1
Behavioral task
behavioral1
Sample
2a706154bfd5a7bfddb0924141dc6aeb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a706154bfd5a7bfddb0924141dc6aeb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.atmmakina.com - Port:
587 - Username:
[email protected] - Password:
Atm9990778atm - Email To:
[email protected]
Targets
-
-
Target
2a706154bfd5a7bfddb0924141dc6aeb_JaffaCakes118
-
Size
723KB
-
MD5
2a706154bfd5a7bfddb0924141dc6aeb
-
SHA1
1cb771526a3f1a3b2bded9f4c43fd70613df0108
-
SHA256
62bdf39d7109c7e7f16a675e23be3085efe10aef41cff698f83a18427a57c02d
-
SHA512
66dd9aff42f5f3311338ef18c3a11a75204f97a9fe23f0380e844da9e5fd4792405bfaffb43fe739cc56e6ab127d4bd2a3563ecc004d94fe0a5b4c7b1572ef5f
-
SSDEEP
12288:xtSV942iNeHK7zTe97KsbvOhPQTgYnpXEXF8PbRAh6v8hOR9fH9Ybe5TV+5bN+m7:xtSVu1bfWUPEgYxE+PtAMlYq5xcAm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-