General
-
Target
6a53a9cc61e4c69958cf54f7cb18f5ed_JaffaCakes118
-
Size
484KB
-
Sample
240523-j9la9saf6w
-
MD5
6a53a9cc61e4c69958cf54f7cb18f5ed
-
SHA1
20969ff3139fa8584d5fbef3586de7b894b468a4
-
SHA256
b1fd3292d4a358db8b0167f471a2aee4046f49a6c9093a8596a537bc9c5f44d4
-
SHA512
7e5ba96fc7bc582b36270b5e26f505328686f1e95757fcec098132a1bf4c464fd1d5944194caa1dbb7ac9fdcbce6168e81e1d90e5f278b4f63908e9a5e49e2f2
-
SSDEEP
6144:9/8Wk7AvIH5jpHvxlEnzNE+9Z7dXIkU74EJeBSdn1/HK1/0YGtLltL7LS+sCC0UY:9/PkcvIZANE+9ZhjJ2eBin1vK1c5UA
Static task
static1
Behavioral task
behavioral1
Sample
6a53a9cc61e4c69958cf54f7cb18f5ed_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6a53a9cc61e4c69958cf54f7cb18f5ed_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
6a53a9cc61e4c69958cf54f7cb18f5ed_JaffaCakes118
-
Size
484KB
-
MD5
6a53a9cc61e4c69958cf54f7cb18f5ed
-
SHA1
20969ff3139fa8584d5fbef3586de7b894b468a4
-
SHA256
b1fd3292d4a358db8b0167f471a2aee4046f49a6c9093a8596a537bc9c5f44d4
-
SHA512
7e5ba96fc7bc582b36270b5e26f505328686f1e95757fcec098132a1bf4c464fd1d5944194caa1dbb7ac9fdcbce6168e81e1d90e5f278b4f63908e9a5e49e2f2
-
SSDEEP
6144:9/8Wk7AvIH5jpHvxlEnzNE+9Z7dXIkU74EJeBSdn1/HK1/0YGtLltL7LS+sCC0UY:9/PkcvIZANE+9ZhjJ2eBin1vK1c5UA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-