General
-
Target
a2f1f5ff51869085af2bb1b8b5078e74_JaffaCakes118
-
Size
612KB
-
Sample
240612-3jm7qavfpc
-
MD5
a2f1f5ff51869085af2bb1b8b5078e74
-
SHA1
83c09e2f98996165faecd0363a03d1355f432e05
-
SHA256
a6d47a142ce8ca991f9090ff981c4a4c5a021030fcc9610a582ecb8c96b607bd
-
SHA512
fac4303ec5d6305cd8591fe688ca3ddb15fe0c864400b5ed4a908dba8eef8f76f23d6bf2c93ee054b5f8991d3f91cf2a6948b2d0eb0def6ba2811e6596940a27
-
SSDEEP
12288:AY2SRgOu9uO2dm4rqoXa3p1bgBFiq58YdW:AxSJvObTV37bkHyYM
Static task
static1
Behavioral task
behavioral1
Sample
a2f1f5ff51869085af2bb1b8b5078e74_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2f1f5ff51869085af2bb1b8b5078e74_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
a2f1f5ff51869085af2bb1b8b5078e74_JaffaCakes118
-
Size
612KB
-
MD5
a2f1f5ff51869085af2bb1b8b5078e74
-
SHA1
83c09e2f98996165faecd0363a03d1355f432e05
-
SHA256
a6d47a142ce8ca991f9090ff981c4a4c5a021030fcc9610a582ecb8c96b607bd
-
SHA512
fac4303ec5d6305cd8591fe688ca3ddb15fe0c864400b5ed4a908dba8eef8f76f23d6bf2c93ee054b5f8991d3f91cf2a6948b2d0eb0def6ba2811e6596940a27
-
SSDEEP
12288:AY2SRgOu9uO2dm4rqoXa3p1bgBFiq58YdW:AxSJvObTV37bkHyYM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-