General
-
Target
31ad987e718ec12c36ca85124ebf2c92_JaffaCakes118
-
Size
1.5MB
-
Sample
241010-y5sl4svdpd
-
MD5
31ad987e718ec12c36ca85124ebf2c92
-
SHA1
31ba440b4046b46c3d47c9f35932c7c0f3112e9e
-
SHA256
e17b4c0fcc016cf6a30e77b46d4db823f9fe125e8cba464c0832f4ee45f60f1e
-
SHA512
5b59d966f11b72f3694e2c063b86a82acc450d1839ba0e19598cd88c674b322eba1e24cfe45b67218f28f9f842cb87c4e5cbef0e96f0ad2b7e1bb05681178a9e
-
SSDEEP
12288:GgKjtZiBrqvSmU9bUZR6NwwHqeRnE2mB1/575jzed+0OK4siChMNQ6H+Uy1SusrT:gZvvSLyZaz6h7xqd5jhMyZZS5R0
Static task
static1
Behavioral task
behavioral1
Sample
31ad987e718ec12c36ca85124ebf2c92_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
31ad987e718ec12c36ca85124ebf2c92_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1778626105:AAG38Q3BQPdUlhSAj_Thbl-k6rCDNlXEi28/sendDocument
Targets
-
-
Target
31ad987e718ec12c36ca85124ebf2c92_JaffaCakes118
-
Size
1.5MB
-
MD5
31ad987e718ec12c36ca85124ebf2c92
-
SHA1
31ba440b4046b46c3d47c9f35932c7c0f3112e9e
-
SHA256
e17b4c0fcc016cf6a30e77b46d4db823f9fe125e8cba464c0832f4ee45f60f1e
-
SHA512
5b59d966f11b72f3694e2c063b86a82acc450d1839ba0e19598cd88c674b322eba1e24cfe45b67218f28f9f842cb87c4e5cbef0e96f0ad2b7e1bb05681178a9e
-
SSDEEP
12288:GgKjtZiBrqvSmU9bUZR6NwwHqeRnE2mB1/575jzed+0OK4siChMNQ6H+Uy1SusrT:gZvvSLyZaz6h7xqd5jhMyZZS5R0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1