General
-
Target
6c0222ca4e3264fcc1687aaead9d5b0e_JaffaCakes118
-
Size
844KB
-
Sample
240523-x17pssdb7t
-
MD5
6c0222ca4e3264fcc1687aaead9d5b0e
-
SHA1
ba804ce098b7f06904a7479347f5ecfe3349744e
-
SHA256
1cf5e8d0a8bcf5fde41e81d015c9b3c517a94401de7834d3644d0a4e5c90afbd
-
SHA512
9162d5aa67e079532cc68f248dc62a5f99ae2ae49e272b1d57adb252805ea1e1da5c5313d9eb53c98813333ad183ccff52ad34202cb9099af2b62ef63c1e8b19
-
SSDEEP
12288:O59M/CUUzFaobCO4kBSzCg6UPH//tg+QZYhSxkbS03nNxLGIn5gZW/1U961Zh38Y:OrYUhzRsCg6Yn++QKSxke6nOZWH
Static task
static1
Behavioral task
behavioral1
Sample
6c0222ca4e3264fcc1687aaead9d5b0e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6c0222ca4e3264fcc1687aaead9d5b0e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
6c0222ca4e3264fcc1687aaead9d5b0e_JaffaCakes118
-
Size
844KB
-
MD5
6c0222ca4e3264fcc1687aaead9d5b0e
-
SHA1
ba804ce098b7f06904a7479347f5ecfe3349744e
-
SHA256
1cf5e8d0a8bcf5fde41e81d015c9b3c517a94401de7834d3644d0a4e5c90afbd
-
SHA512
9162d5aa67e079532cc68f248dc62a5f99ae2ae49e272b1d57adb252805ea1e1da5c5313d9eb53c98813333ad183ccff52ad34202cb9099af2b62ef63c1e8b19
-
SSDEEP
12288:O59M/CUUzFaobCO4kBSzCg6UPH//tg+QZYhSxkbS03nNxLGIn5gZW/1U961Zh38Y:OrYUhzRsCg6Yn++QKSxke6nOZWH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-