General
-
Target
5131cdfe8f6e09ec19fcb864f655add8_JaffaCakes118
-
Size
673KB
-
Sample
240517-yjczjafh74
-
MD5
5131cdfe8f6e09ec19fcb864f655add8
-
SHA1
6381376db2cc0fc6ab2fda54a37753718d4804c1
-
SHA256
40d6a169fdb6d664157c9850182f19d0c066b7debe373a7ca7298d47bcf9c7a3
-
SHA512
f44cc62148df0a8cbc44138f1452fc782cfa952e5dfa5f56765d23b57dffcb3f8667c5cfa18aba0408d78405120c297c729427741d0620cca9d7c0a139e37dfd
-
SSDEEP
6144:OK3QQW6I1XWThfuDYGSZXOye4zq+RmBj2h0rnsnkikv4B:OMQNY9GSZXO4zqym9fikwB
Static task
static1
Behavioral task
behavioral1
Sample
5131cdfe8f6e09ec19fcb864f655add8_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5131cdfe8f6e09ec19fcb864f655add8_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
5131cdfe8f6e09ec19fcb864f655add8_JaffaCakes118
-
Size
673KB
-
MD5
5131cdfe8f6e09ec19fcb864f655add8
-
SHA1
6381376db2cc0fc6ab2fda54a37753718d4804c1
-
SHA256
40d6a169fdb6d664157c9850182f19d0c066b7debe373a7ca7298d47bcf9c7a3
-
SHA512
f44cc62148df0a8cbc44138f1452fc782cfa952e5dfa5f56765d23b57dffcb3f8667c5cfa18aba0408d78405120c297c729427741d0620cca9d7c0a139e37dfd
-
SSDEEP
6144:OK3QQW6I1XWThfuDYGSZXOye4zq+RmBj2h0rnsnkikv4B:OMQNY9GSZXO4zqym9fikwB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-