General
-
Target
02ba8a2d71cdcefc9c02b71ed27f39ba_JaffaCakes118
-
Size
1.5MB
-
Sample
240427-jc9mladh77
-
MD5
02ba8a2d71cdcefc9c02b71ed27f39ba
-
SHA1
6c5c866aaeb4d7aebb5744e325186a38824e0b3d
-
SHA256
93dcfe7d101d1feaf4a43296fa1788d47f818030480fa5d4a60dca98a24e53db
-
SHA512
d47d9d7a3900103f3b7c793bb32857c63e7096625a098233784ba0645353f13cf988170837b470be71dad11cb58d1052ad529049e303550bb91dc59e6811d483
-
SSDEEP
24576:zu6Jx3O0c+JY5UZ+XC0kGso/WaDZijqIYtJvuGgJgqYtWY:dI0c++OCvkGsUWaDrqtY
Static task
static1
Behavioral task
behavioral1
Sample
02ba8a2d71cdcefc9c02b71ed27f39ba_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
02ba8a2d71cdcefc9c02b71ed27f39ba_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
02ba8a2d71cdcefc9c02b71ed27f39ba_JaffaCakes118
-
Size
1.5MB
-
MD5
02ba8a2d71cdcefc9c02b71ed27f39ba
-
SHA1
6c5c866aaeb4d7aebb5744e325186a38824e0b3d
-
SHA256
93dcfe7d101d1feaf4a43296fa1788d47f818030480fa5d4a60dca98a24e53db
-
SHA512
d47d9d7a3900103f3b7c793bb32857c63e7096625a098233784ba0645353f13cf988170837b470be71dad11cb58d1052ad529049e303550bb91dc59e6811d483
-
SSDEEP
24576:zu6Jx3O0c+JY5UZ+XC0kGso/WaDZijqIYtJvuGgJgqYtWY:dI0c++OCvkGsUWaDrqtY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-