General
-
Target
4776da05c78ba1b356b957c481de3df9_JaffaCakes118
-
Size
837KB
-
Sample
241015-m965hs1cne
-
MD5
4776da05c78ba1b356b957c481de3df9
-
SHA1
16b6634b431682895f07c4ff1d912ef844712aa9
-
SHA256
37618200ca15f760f9eb09fcaa6a6e9f9591ea49c69d3db0a5e47af01913bb3c
-
SHA512
e8f406488554317dec310d2554df0f0da57b192aaff86c1467bd8cdda37721cdc22eb3f7adf5d88fabd8fa1bd15a96c8706558410cb0e8c7cc60c96d404579c5
-
SSDEEP
12288:0cvddSZzt2NjFmzPXHuXJ1+scrL7J3yCGXF+8g10nErLaKe3P1HZVD:0OddSZzMNj2QJ1YyCGXF+8e03P5ZV
Static task
static1
Behavioral task
behavioral1
Sample
4776da05c78ba1b356b957c481de3df9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4776da05c78ba1b356b957c481de3df9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@Mexico1.,
Targets
-
-
Target
4776da05c78ba1b356b957c481de3df9_JaffaCakes118
-
Size
837KB
-
MD5
4776da05c78ba1b356b957c481de3df9
-
SHA1
16b6634b431682895f07c4ff1d912ef844712aa9
-
SHA256
37618200ca15f760f9eb09fcaa6a6e9f9591ea49c69d3db0a5e47af01913bb3c
-
SHA512
e8f406488554317dec310d2554df0f0da57b192aaff86c1467bd8cdda37721cdc22eb3f7adf5d88fabd8fa1bd15a96c8706558410cb0e8c7cc60c96d404579c5
-
SSDEEP
12288:0cvddSZzt2NjFmzPXHuXJ1+scrL7J3yCGXF+8g10nErLaKe3P1HZVD:0OddSZzMNj2QJ1YyCGXF+8e03P5ZV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1