General
-
Target
072a4b9ea22d754157c9da924b4d1df7_JaffaCakes118
-
Size
602KB
-
Sample
240429-jnwj4sdg45
-
MD5
072a4b9ea22d754157c9da924b4d1df7
-
SHA1
672f4c8110cf11fb08060e77f5251d31995842cf
-
SHA256
703a0db4266a693c62599cc58258bc2cf64ad02a1435c1d44a6d15fcc2b6fa39
-
SHA512
ecfc397750a1c514346e3e6319dcc23d68e2c51c57508e306ac36cf3279a6490ffef2c5c4654c6d0b79cfd12876aede777f7e326e7b320ba89b8c44340079eef
-
SSDEEP
12288:I6AjjimN6BScnSBaByTowftqmgDYddBe+tzBdR15:8cfBcf5hddBe+Z
Static task
static1
Behavioral task
behavioral1
Sample
072a4b9ea22d754157c9da924b4d1df7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
072a4b9ea22d754157c9da924b4d1df7_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
072a4b9ea22d754157c9da924b4d1df7_JaffaCakes118
-
Size
602KB
-
MD5
072a4b9ea22d754157c9da924b4d1df7
-
SHA1
672f4c8110cf11fb08060e77f5251d31995842cf
-
SHA256
703a0db4266a693c62599cc58258bc2cf64ad02a1435c1d44a6d15fcc2b6fa39
-
SHA512
ecfc397750a1c514346e3e6319dcc23d68e2c51c57508e306ac36cf3279a6490ffef2c5c4654c6d0b79cfd12876aede777f7e326e7b320ba89b8c44340079eef
-
SSDEEP
12288:I6AjjimN6BScnSBaByTowftqmgDYddBe+tzBdR15:8cfBcf5hddBe+Z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-