General
-
Target
042148e013b3678de1e41db9df9b53e7_JaffaCakes118
-
Size
505KB
-
Sample
240428-cfr4dseb4x
-
MD5
042148e013b3678de1e41db9df9b53e7
-
SHA1
ed01c27283dfb30488073f353ebed55d7ae2576c
-
SHA256
aaf0ba4037857585f2966246b1453969a7fa246ba09bf20a08fc94126e4e5426
-
SHA512
d850c4491712ba25b2cbd5b189e0d894acbb37c81a58c484d8d6143e0e882d0948ff61837f0e35bafe1525bcb01368edda41ec5658a2f37d2b335133e1e21235
-
SSDEEP
12288:ZyV/hyPheENKBq0znR9TELZxeqpL3s2YpJhBv/V0zWnj:S/APhNKvbEDeqpL33wJN8Wn
Static task
static1
Behavioral task
behavioral1
Sample
042148e013b3678de1e41db9df9b53e7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
042148e013b3678de1e41db9df9b53e7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
042148e013b3678de1e41db9df9b53e7_JaffaCakes118
-
Size
505KB
-
MD5
042148e013b3678de1e41db9df9b53e7
-
SHA1
ed01c27283dfb30488073f353ebed55d7ae2576c
-
SHA256
aaf0ba4037857585f2966246b1453969a7fa246ba09bf20a08fc94126e4e5426
-
SHA512
d850c4491712ba25b2cbd5b189e0d894acbb37c81a58c484d8d6143e0e882d0948ff61837f0e35bafe1525bcb01368edda41ec5658a2f37d2b335133e1e21235
-
SSDEEP
12288:ZyV/hyPheENKBq0znR9TELZxeqpL3s2YpJhBv/V0zWnj:S/APhNKvbEDeqpL33wJN8Wn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-