Resubmissions
11-10-2024 20:16
241011-y19d3aweqj 10General
-
Target
369fd4547b0f650c008591f843f69648_JaffaCakes118
-
Size
760KB
-
Sample
241011-y19d3aweqj
-
MD5
369fd4547b0f650c008591f843f69648
-
SHA1
3e3689bd1161dd26728904d112f2fc6cbfa2058e
-
SHA256
12a902e9e73f77a5e28f18900342d8425c3464466835a1b39c7fd073501e4ef8
-
SHA512
b1f77948303d6314c1db1b57e80bb2c9044d2824196d498b53bfea731ccf48d2bd7214f232db1665426a1ee5434cbe4a6cb489a0e44fc2eff5287955a6d0c74b
-
SSDEEP
12288:QEPS2iNeHK7zxJ/3DSJOkU0LRrrh2aBKuHO+U5I54q6CpEEqh34s0vPKJ1+NNMcW:QEK1bT3pk9LaaBRHO+U+F6SC0vPKJE7v
Static task
static1
Behavioral task
behavioral1
Sample
369fd4547b0f650c008591f843f69648_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
369fd4547b0f650c008591f843f69648_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.barbanoarredamenti.it - Port:
587 - Username:
[email protected] - Password:
Barbano1717! - Email To:
[email protected]
Targets
-
-
Target
369fd4547b0f650c008591f843f69648_JaffaCakes118
-
Size
760KB
-
MD5
369fd4547b0f650c008591f843f69648
-
SHA1
3e3689bd1161dd26728904d112f2fc6cbfa2058e
-
SHA256
12a902e9e73f77a5e28f18900342d8425c3464466835a1b39c7fd073501e4ef8
-
SHA512
b1f77948303d6314c1db1b57e80bb2c9044d2824196d498b53bfea731ccf48d2bd7214f232db1665426a1ee5434cbe4a6cb489a0e44fc2eff5287955a6d0c74b
-
SSDEEP
12288:QEPS2iNeHK7zxJ/3DSJOkU0LRrrh2aBKuHO+U5I54q6CpEEqh34s0vPKJ1+NNMcW:QEK1bT3pk9LaaBRHO+U+F6SC0vPKJE7v
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1