General
-
Target
aa0197e7eaf25e744848b0ca2e9fee19_JaffaCakes118
-
Size
802KB
-
Sample
240614-q4rdnatape
-
MD5
aa0197e7eaf25e744848b0ca2e9fee19
-
SHA1
0ac900b74575c1f7eb67faccb45b9f4c5bea96ac
-
SHA256
10af54c6e3ab8f8f1d82b73ef2cc696bb06d11d37b7e3280dda284682ce79e55
-
SHA512
34a54a9ba719404482b608aecd2000845374d3e91798dcd346bbdedaf8ca809a0df9b8f67a7cc6a3637ab6a10ef70d2c109c37b3a25c87d2ad02fded08fb5ac9
-
SSDEEP
24576:UgzH2hWNMuodM0cdAm+obE+1HlFh0aMTX:UgzWky9cdAm+635MTX
Static task
static1
Behavioral task
behavioral1
Sample
aa0197e7eaf25e744848b0ca2e9fee19_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa0197e7eaf25e744848b0ca2e9fee19_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
aa0197e7eaf25e744848b0ca2e9fee19_JaffaCakes118
-
Size
802KB
-
MD5
aa0197e7eaf25e744848b0ca2e9fee19
-
SHA1
0ac900b74575c1f7eb67faccb45b9f4c5bea96ac
-
SHA256
10af54c6e3ab8f8f1d82b73ef2cc696bb06d11d37b7e3280dda284682ce79e55
-
SHA512
34a54a9ba719404482b608aecd2000845374d3e91798dcd346bbdedaf8ca809a0df9b8f67a7cc6a3637ab6a10ef70d2c109c37b3a25c87d2ad02fded08fb5ac9
-
SSDEEP
24576:UgzH2hWNMuodM0cdAm+obE+1HlFh0aMTX:UgzWky9cdAm+635MTX
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-