General
-
Target
JaffaCakes118_19dec01dd443f8b82e82a5f5f260be0b
-
Size
355KB
-
Sample
250106-kndvqsskav
-
MD5
19dec01dd443f8b82e82a5f5f260be0b
-
SHA1
e77d6ad6acacaccc30dae50608b2c5721ffda526
-
SHA256
e67bdb94ed97481a1f6fa8790187a39e6f7641ae65f4ef0e601ba9c6da0cfa87
-
SHA512
9cd0189d07a88b8c11e21c9c796346548cafab4a5f2f98eed7c07ddd40f23921b31e20002ac9b62c29cb9d26037efb9cf29c2594bac6875d85ef3eb7f53cd543
-
SSDEEP
1536:EUz92i3yJc81fdDuJ8V+5FocQfb1xgHXuCL/iv6+y7X+mw/ie/uNVixz7+TmS5Pt:NsG
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_19dec01dd443f8b82e82a5f5f260be0b.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_19dec01dd443f8b82e82a5f5f260be0b.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
http://103.125.190.248/j/p11l/mawa/0b5eace2c983ebeba55b.php
Targets
-
-
Target
JaffaCakes118_19dec01dd443f8b82e82a5f5f260be0b
-
Size
355KB
-
MD5
19dec01dd443f8b82e82a5f5f260be0b
-
SHA1
e77d6ad6acacaccc30dae50608b2c5721ffda526
-
SHA256
e67bdb94ed97481a1f6fa8790187a39e6f7641ae65f4ef0e601ba9c6da0cfa87
-
SHA512
9cd0189d07a88b8c11e21c9c796346548cafab4a5f2f98eed7c07ddd40f23921b31e20002ac9b62c29cb9d26037efb9cf29c2594bac6875d85ef3eb7f53cd543
-
SSDEEP
1536:EUz92i3yJc81fdDuJ8V+5FocQfb1xgHXuCL/iv6+y7X+mw/ie/uNVixz7+TmS5Pt:NsG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-