General
-
Target
4494b2b76c93a8eaf0c95fb04c7eff70_JaffaCakes118
-
Size
1.5MB
-
Sample
241014-2vxpvsvbmm
-
MD5
4494b2b76c93a8eaf0c95fb04c7eff70
-
SHA1
3f851cc1f324d316a341d8113f9ccf8021ee7b4c
-
SHA256
b2d0646c000d113ebaf252cf3d5eac243608b1358c653e7ec7fd85880cf1f5d4
-
SHA512
4053854888f9381edc83ef9b89ff60c8ad878d640ac58a14d2f262abd8d09b16f046beb7b3fd301938fe1de113c236bef1fe43658db9be3511c9f7d95cc67a07
-
SSDEEP
24576:bZhWmQaCOpzry5nKE1BXLUbwm4EZZS5R0:P4Opffiqwm4E3B
Static task
static1
Behavioral task
behavioral1
Sample
4494b2b76c93a8eaf0c95fb04c7eff70_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4494b2b76c93a8eaf0c95fb04c7eff70_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aninditaeng.net - Port:
587 - Username:
[email protected] - Password:
t2weClGi1f~7Elps - Email To:
[email protected]
Targets
-
-
Target
4494b2b76c93a8eaf0c95fb04c7eff70_JaffaCakes118
-
Size
1.5MB
-
MD5
4494b2b76c93a8eaf0c95fb04c7eff70
-
SHA1
3f851cc1f324d316a341d8113f9ccf8021ee7b4c
-
SHA256
b2d0646c000d113ebaf252cf3d5eac243608b1358c653e7ec7fd85880cf1f5d4
-
SHA512
4053854888f9381edc83ef9b89ff60c8ad878d640ac58a14d2f262abd8d09b16f046beb7b3fd301938fe1de113c236bef1fe43658db9be3511c9f7d95cc67a07
-
SSDEEP
24576:bZhWmQaCOpzry5nKE1BXLUbwm4EZZS5R0:P4Opffiqwm4E3B
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1