General
-
Target
357067685a8a687795276a45aad7d4cc_JaffaCakes118
-
Size
676KB
-
Sample
241011-sktqsatenl
-
MD5
357067685a8a687795276a45aad7d4cc
-
SHA1
25c1e94ce37ee39b254d08cfdcd7207a35e5650c
-
SHA256
7aa9168ac939fe52cad38ab87124d3afc732d0ab32ae872731e92fce2bf8e856
-
SHA512
ea29bd39d081dbcd1d702d46e6391ce2f4ed2819a3083f929f9bff27f87b9f5f7706b0be132dddd98401e89ffebef6dfb7b736bd507f988af8a32f1b768fa592
-
SSDEEP
12288:fB8QkRRoGkpFPRfVFnyYV7+Zh5YQkBtB6L:f2QkRmGeFPRtjV7+X5YQyB6L
Static task
static1
Behavioral task
behavioral1
Sample
357067685a8a687795276a45aad7d4cc_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
357067685a8a687795276a45aad7d4cc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.chamundeshwari.com - Port:
587 - Username:
[email protected] - Password:
5>KPDhsW
Targets
-
-
Target
357067685a8a687795276a45aad7d4cc_JaffaCakes118
-
Size
676KB
-
MD5
357067685a8a687795276a45aad7d4cc
-
SHA1
25c1e94ce37ee39b254d08cfdcd7207a35e5650c
-
SHA256
7aa9168ac939fe52cad38ab87124d3afc732d0ab32ae872731e92fce2bf8e856
-
SHA512
ea29bd39d081dbcd1d702d46e6391ce2f4ed2819a3083f929f9bff27f87b9f5f7706b0be132dddd98401e89ffebef6dfb7b736bd507f988af8a32f1b768fa592
-
SSDEEP
12288:fB8QkRRoGkpFPRfVFnyYV7+Zh5YQkBtB6L:f2QkRmGeFPRtjV7+X5YQyB6L
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1