General
-
Target
fd8a25baabe1fc7584d0538cbaa9c783_JaffaCakes118
-
Size
882KB
-
Sample
241218-3ge4bswqd1
-
MD5
fd8a25baabe1fc7584d0538cbaa9c783
-
SHA1
4ecd1ce2c9ea56bf293996047ad5cf5ca1ac09bf
-
SHA256
900ce3af8a92e086a0332e7a69033a5e25f31a6a3a553003086f7bed958e3432
-
SHA512
7f4b0186957917f34ee90dcd51c7ab16a7ed14a127b3fedc34dbdabae3c7eb7b6535e9fc1317726131cd9326ad3e0df00a803bcde415e66241f1e9fde4c789ed
-
SSDEEP
12288:ndA9KMRxkFKCQ2vU78zAb1p3mPoa0g4PZ1EnB8cuEXLCwIeOQHK7z+zKboASLF:dA9jkFKww8z0p344PYBRtCBeOQKboF
Static task
static1
Behavioral task
behavioral1
Sample
fd8a25baabe1fc7584d0538cbaa9c783_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd8a25baabe1fc7584d0538cbaa9c783_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.zoho.com - Port:
587 - Username:
[email protected] - Password:
JesusChrist007
Targets
-
-
Target
fd8a25baabe1fc7584d0538cbaa9c783_JaffaCakes118
-
Size
882KB
-
MD5
fd8a25baabe1fc7584d0538cbaa9c783
-
SHA1
4ecd1ce2c9ea56bf293996047ad5cf5ca1ac09bf
-
SHA256
900ce3af8a92e086a0332e7a69033a5e25f31a6a3a553003086f7bed958e3432
-
SHA512
7f4b0186957917f34ee90dcd51c7ab16a7ed14a127b3fedc34dbdabae3c7eb7b6535e9fc1317726131cd9326ad3e0df00a803bcde415e66241f1e9fde4c789ed
-
SSDEEP
12288:ndA9KMRxkFKCQ2vU78zAb1p3mPoa0g4PZ1EnB8cuEXLCwIeOQHK7z+zKboASLF:dA9jkFKww8z0p344PYBRtCBeOQKboF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1