General
-
Target
636588721d91d2d8846d7acbee2993e9_JaffaCakes118
-
Size
918KB
-
Sample
240521-qcnhpafa4w
-
MD5
636588721d91d2d8846d7acbee2993e9
-
SHA1
73ef1d0d5e9dabcbebd365c242c7f864d3e06ae5
-
SHA256
962c48baefe8995af1ccc8a4e3d45e460eb9889076a945dcac7f3a438a9644db
-
SHA512
58d3f8591eedf9780fed1e2a52ec8d15c3f310cbb38a18450f9362291aad5f55f810dd9f477a1121b62478af4c340c727422784351fcc114ab0d9eb5c8458b43
-
SSDEEP
24576:GWOrAw+ELFLmRFHeNFy8pSwSPXB48eEM4o/Nti2/q1:GWOrAw+ELFLmRUNFy8pSwSPXB48er4oS
Static task
static1
Behavioral task
behavioral1
Sample
636588721d91d2d8846d7acbee2993e9_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
636588721d91d2d8846d7acbee2993e9_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
636588721d91d2d8846d7acbee2993e9_JaffaCakes118
-
Size
918KB
-
MD5
636588721d91d2d8846d7acbee2993e9
-
SHA1
73ef1d0d5e9dabcbebd365c242c7f864d3e06ae5
-
SHA256
962c48baefe8995af1ccc8a4e3d45e460eb9889076a945dcac7f3a438a9644db
-
SHA512
58d3f8591eedf9780fed1e2a52ec8d15c3f310cbb38a18450f9362291aad5f55f810dd9f477a1121b62478af4c340c727422784351fcc114ab0d9eb5c8458b43
-
SSDEEP
24576:GWOrAw+ELFLmRFHeNFy8pSwSPXB48eEM4o/Nti2/q1:GWOrAw+ELFLmRUNFy8pSwSPXB48er4oS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-