General
-
Target
3bc86ac6b99cd20ae67a38f81396aca5_JaffaCakes118
-
Size
839KB
-
Sample
241012-ykqa9aycqa
-
MD5
3bc86ac6b99cd20ae67a38f81396aca5
-
SHA1
8ca449b1fde37550983f4b9ff839748d7e227f12
-
SHA256
bebc3da436336c51dd91d24c9f57dc84743775f89f878c0eee75d442372b3749
-
SHA512
c6c3c0989f75dc88548ed8f2ba4801328034377939736416299ea4496d7bf73e79ff12906f5d9e9fe2b51aae2a65cee56f3ad13d078d60cbb5fdd84c75e77f75
-
SSDEEP
12288:LIfKxn3qGaNHEyC9/oR9gy5FHK7znJ8oL6LuUe6pD24QGGnC+i8KQKcusXgPTlrf:LkKpPp9AR95yaoLEa9M+5XgrlL
Static task
static1
Behavioral task
behavioral1
Sample
3bc86ac6b99cd20ae67a38f81396aca5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3bc86ac6b99cd20ae67a38f81396aca5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kenmascs.com - Port:
587 - Username:
[email protected] - Password:
Kenya254! - Email To:
[email protected]
Targets
-
-
Target
3bc86ac6b99cd20ae67a38f81396aca5_JaffaCakes118
-
Size
839KB
-
MD5
3bc86ac6b99cd20ae67a38f81396aca5
-
SHA1
8ca449b1fde37550983f4b9ff839748d7e227f12
-
SHA256
bebc3da436336c51dd91d24c9f57dc84743775f89f878c0eee75d442372b3749
-
SHA512
c6c3c0989f75dc88548ed8f2ba4801328034377939736416299ea4496d7bf73e79ff12906f5d9e9fe2b51aae2a65cee56f3ad13d078d60cbb5fdd84c75e77f75
-
SSDEEP
12288:LIfKxn3qGaNHEyC9/oR9gy5FHK7znJ8oL6LuUe6pD24QGGnC+i8KQKcusXgPTlrf:LkKpPp9AR95yaoLEa9M+5XgrlL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1