General
-
Target
JaffaCakes118_12c88b22c80eb72af2065c62fcaba2a68bf5da17e50a777bd7aeaff69be3b883
-
Size
232KB
-
Sample
241222-xwdadswlc1
-
MD5
a1c1520fea7414a883ea8c42cc89d4e0
-
SHA1
ab2376de9d0e83346a7adb3b9784107416d7a476
-
SHA256
12c88b22c80eb72af2065c62fcaba2a68bf5da17e50a777bd7aeaff69be3b883
-
SHA512
76565855c2df6506823599c175d9477dedb4beca17fcee2fa4519b0471afaa905d6d08e7517459e9fa3d9b04ffbfbdb44624c117905609a1900087b2d62fa642
-
SSDEEP
6144:KSagYHn4yUNQkgh2hMMqdp5oMpmZrbuQQ:KSagon4XkboMpmZfI
Behavioral task
behavioral1
Sample
JaffaCakes118_12c88b22c80eb72af2065c62fcaba2a68bf5da17e50a777bd7aeaff69be3b883.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_12c88b22c80eb72af2065c62fcaba2a68bf5da17e50a777bd7aeaff69be3b883.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
xvdUCau3
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
xvdUCau3
Targets
-
-
Target
JaffaCakes118_12c88b22c80eb72af2065c62fcaba2a68bf5da17e50a777bd7aeaff69be3b883
-
Size
232KB
-
MD5
a1c1520fea7414a883ea8c42cc89d4e0
-
SHA1
ab2376de9d0e83346a7adb3b9784107416d7a476
-
SHA256
12c88b22c80eb72af2065c62fcaba2a68bf5da17e50a777bd7aeaff69be3b883
-
SHA512
76565855c2df6506823599c175d9477dedb4beca17fcee2fa4519b0471afaa905d6d08e7517459e9fa3d9b04ffbfbdb44624c117905609a1900087b2d62fa642
-
SSDEEP
6144:KSagYHn4yUNQkgh2hMMqdp5oMpmZrbuQQ:KSagon4XkboMpmZfI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1