General
-
Target
a1b019d4fae8f5f9728e78151a8ed69f_JaffaCakes118
-
Size
354KB
-
Sample
240612-wvg2hsvcjd
-
MD5
a1b019d4fae8f5f9728e78151a8ed69f
-
SHA1
1ba5ebd26b62ec8abc846fe67b812493862978ed
-
SHA256
1366510b06b23b46e8de8bb22e63cc6052bed981f3b41aecc23fb8e6c654734e
-
SHA512
22f47ec8b77279b8aa9802cde893aa1a8524d8fe6fff38d0252401ed5ef71abac82cdf0e6e119bc89ab32955e0af8ba2b6fe4b844e02d18eb0289fa645f41b5b
-
SSDEEP
6144:dvB9U/NhUTtwQmh1+cOPfezP2tSTcRmpbT5DExuKu3yP7ooLMM:dZ9U/NMKf+cGoTcRcbTFEwVyp
Behavioral task
behavioral1
Sample
a1b019d4fae8f5f9728e78151a8ed69f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a1b019d4fae8f5f9728e78151a8ed69f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
a1b019d4fae8f5f9728e78151a8ed69f_JaffaCakes118
-
Size
354KB
-
MD5
a1b019d4fae8f5f9728e78151a8ed69f
-
SHA1
1ba5ebd26b62ec8abc846fe67b812493862978ed
-
SHA256
1366510b06b23b46e8de8bb22e63cc6052bed981f3b41aecc23fb8e6c654734e
-
SHA512
22f47ec8b77279b8aa9802cde893aa1a8524d8fe6fff38d0252401ed5ef71abac82cdf0e6e119bc89ab32955e0af8ba2b6fe4b844e02d18eb0289fa645f41b5b
-
SSDEEP
6144:dvB9U/NhUTtwQmh1+cOPfezP2tSTcRmpbT5DExuKu3yP7ooLMM:dZ9U/NMKf+cGoTcRcbTFEwVyp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-