General
-
Target
029ba195c7ee484f1d9e890cb53c3253_JaffaCakes118
-
Size
280KB
-
Sample
240427-gy8w3scg66
-
MD5
029ba195c7ee484f1d9e890cb53c3253
-
SHA1
0f70c95f5fbb79bd5706fa95c50f6396d4a5287f
-
SHA256
9f831e9bfb119196a397daf7a20e88c1a4b6fedea30f480e790e1949053b01bf
-
SHA512
6cc099fa017d5be11f90a5038deb05bc4df9e0347255264ecb74fdbcdb10b8d592eeefc9effadc84997fa3cf66f21537ce9ddf1208731846386ce0a75603a32b
-
SSDEEP
3072:88B9eGRGf/lHy2xlP9xlISMxyNNjs5dfI85oBhmAjSuHauBFdCL+m7YniIHUlgi:88B8Ny2bP9xlIPFzfI85oTmAGuHlqCd
Static task
static1
Behavioral task
behavioral1
Sample
029ba195c7ee484f1d9e890cb53c3253_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
029ba195c7ee484f1d9e890cb53c3253_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
029ba195c7ee484f1d9e890cb53c3253_JaffaCakes118
-
Size
280KB
-
MD5
029ba195c7ee484f1d9e890cb53c3253
-
SHA1
0f70c95f5fbb79bd5706fa95c50f6396d4a5287f
-
SHA256
9f831e9bfb119196a397daf7a20e88c1a4b6fedea30f480e790e1949053b01bf
-
SHA512
6cc099fa017d5be11f90a5038deb05bc4df9e0347255264ecb74fdbcdb10b8d592eeefc9effadc84997fa3cf66f21537ce9ddf1208731846386ce0a75603a32b
-
SSDEEP
3072:88B9eGRGf/lHy2xlP9xlISMxyNNjs5dfI85oBhmAjSuHauBFdCL+m7YniIHUlgi:88B8Ny2bP9xlIPFzfI85oTmAGuHlqCd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-