General
-
Target
JaffaCakes118_9249e079e690f7368f35e72ead12f8bd
-
Size
625KB
-
Sample
250108-yb2ypasqcl
-
MD5
9249e079e690f7368f35e72ead12f8bd
-
SHA1
1c454bee42bd628d33ca3c7084607e189592071e
-
SHA256
8dbd29ed8c36099508bbeb90855efd7c10047f80b04c2708a1359338b5d432b1
-
SHA512
c7e29d4592eeaddad6d26ada22accddce5d7e74b11fb04553e42128f7007722473e599a347368c89dff0c9dc085f6b8cd44677ffb6a6a8a8a17262c9fa0f6b85
-
SSDEEP
12288:aezvEBCTMB6UBqeZQpe16iOCL7GisZP7r9r/+ppppppppppppppppppppppppppx:aezsjBOCL7f21q
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9249e079e690f7368f35e72ead12f8bd.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.globistics.co.ke - Port:
587 - Username:
[email protected] - Password:
777@!mports - Email To:
[email protected]
Targets
-
-
Target
JaffaCakes118_9249e079e690f7368f35e72ead12f8bd
-
Size
625KB
-
MD5
9249e079e690f7368f35e72ead12f8bd
-
SHA1
1c454bee42bd628d33ca3c7084607e189592071e
-
SHA256
8dbd29ed8c36099508bbeb90855efd7c10047f80b04c2708a1359338b5d432b1
-
SHA512
c7e29d4592eeaddad6d26ada22accddce5d7e74b11fb04553e42128f7007722473e599a347368c89dff0c9dc085f6b8cd44677ffb6a6a8a8a17262c9fa0f6b85
-
SSDEEP
12288:aezvEBCTMB6UBqeZQpe16iOCL7GisZP7r9r/+ppppppppppppppppppppppppppx:aezsjBOCL7f21q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
A potential corporate email address has been identified in the URL: [email protected]
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1