General
-
Target
JaffaCakes118_3fa5a725a06c659ea52485d39fbd57fe
-
Size
510KB
-
Sample
250106-224fzstqfk
-
MD5
3fa5a725a06c659ea52485d39fbd57fe
-
SHA1
cb8d0f45dce7cb5ac1b2fb0d072e17c901c0f6b9
-
SHA256
3835f10ca0edbb186858d08337df45427ba97816474ac1be7e8102e9d4ebca72
-
SHA512
158c83f9ac48cdf1eb9112f67f90fe56e4d5837127eb0aae721c1b5c2b7588c4e48c8e0d7345b569ef674931fff8660da57b4c7b88c427c8cdb3af1abba53659
-
SSDEEP
12288:24LDqJFTP6uX8XCwHYWlWgt+lwLXLHCm8FuZ6EfH6:24LDqeuXcCwXlWgMlaXJ8FNMa
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3fa5a725a06c659ea52485d39fbd57fe.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3fa5a725a06c659ea52485d39fbd57fe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
SMTP.yandex.com - Port:
587 - Username:
[email protected] - Password:
Nwamama121
Targets
-
-
Target
JaffaCakes118_3fa5a725a06c659ea52485d39fbd57fe
-
Size
510KB
-
MD5
3fa5a725a06c659ea52485d39fbd57fe
-
SHA1
cb8d0f45dce7cb5ac1b2fb0d072e17c901c0f6b9
-
SHA256
3835f10ca0edbb186858d08337df45427ba97816474ac1be7e8102e9d4ebca72
-
SHA512
158c83f9ac48cdf1eb9112f67f90fe56e4d5837127eb0aae721c1b5c2b7588c4e48c8e0d7345b569ef674931fff8660da57b4c7b88c427c8cdb3af1abba53659
-
SSDEEP
12288:24LDqJFTP6uX8XCwHYWlWgt+lwLXLHCm8FuZ6EfH6:24LDqeuXcCwXlWgMlaXJ8FNMa
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1