General
-
Target
JaffaCakes118_e2df9e0287a3f974981718891b00d394d137ec08301708a358464ccb0e624471
-
Size
94KB
-
Sample
241225-ehhnvaxmbk
-
MD5
e6a437d39d831dc07748f71fb788c4ea
-
SHA1
57ec10492faa05b2aec0081e1baceb8b6854a71d
-
SHA256
e2df9e0287a3f974981718891b00d394d137ec08301708a358464ccb0e624471
-
SHA512
724b34a21ee55509d081236ee8357a27b5fdeed461663803dcea6cf4247cf4b84b3fcacc56b44783c671caa90b856ebf974ede7c82ae97f81222bb94d85ef6b3
-
SSDEEP
1536:jgHbv/OuXB1qKQ5YZlVcUfnrbmX5oh3/XsnVGk6jKUDkxwh0CnnWK:jgHbv/OuXB/R9zHgGTNkz+b
Behavioral task
behavioral1
Sample
fdda2277625cf95b5fee831d58cf5ab0606bc81a832669c4c5f7469b5d7048e1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdda2277625cf95b5fee831d58cf5ab0606bc81a832669c4c5f7469b5d7048e1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.vvis.com.ph - Port:
587 - Username:
[email protected] - Password:
May192017 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.vvis.com.ph - Port:
587 - Username:
[email protected] - Password:
May192017
Targets
-
-
Target
fdda2277625cf95b5fee831d58cf5ab0606bc81a832669c4c5f7469b5d7048e1
-
Size
208KB
-
MD5
6c0c6a5a66f4ff1b21325cb9d069e115
-
SHA1
73b0a7cff74ae8191f0cc33ba48053c260dc767f
-
SHA256
fdda2277625cf95b5fee831d58cf5ab0606bc81a832669c4c5f7469b5d7048e1
-
SHA512
dede722b3f3d0dfa4b97b296f35653f47c985079b691eea3e6e3c3e21a54b3236af940658f6887a36051583e6c6795afd00284cd951cbbea0222360a802b6be2
-
SSDEEP
3072:6mnojXT/SrCpGWEg18eXIV0E7Wh8Ffdl/Q5UX6RUG4dFVc4mWSUansTZYRp7uIt2:6mnqIV0E7WhylUUX6RUGKcHflpN2k3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1