General
-
Target
b79c2962f6d33ecfc5960ef0c16721b9_JaffaCakes118
-
Size
576KB
-
Sample
240617-j7t6dswdlm
-
MD5
b79c2962f6d33ecfc5960ef0c16721b9
-
SHA1
cfbf68a0a362e40b6af7bbaaec9bd2ea42df34b3
-
SHA256
17a38ca3340b3edb5c7fc9f2166e14b10e4d6ee785fc850152c8faba449af480
-
SHA512
0b71e2127c02f001c50b3df0393408a9d0d285850c0622ea0e881101d59a17f445544bb743de271e40282457dff754d298c4192259ed76b9d0986da539b935c5
-
SSDEEP
12288:QEUXlPH1EecQYusd956Zv7mJ58/8xJqUin+AAWy8i1Zhq/:QEUVvmosd956ZqP8ExJqXAQi1
Static task
static1
Behavioral task
behavioral1
Sample
b79c2962f6d33ecfc5960ef0c16721b9_JaffaCakes118.msi
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b79c2962f6d33ecfc5960ef0c16721b9_JaffaCakes118.msi
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
b79c2962f6d33ecfc5960ef0c16721b9_JaffaCakes118
-
Size
576KB
-
MD5
b79c2962f6d33ecfc5960ef0c16721b9
-
SHA1
cfbf68a0a362e40b6af7bbaaec9bd2ea42df34b3
-
SHA256
17a38ca3340b3edb5c7fc9f2166e14b10e4d6ee785fc850152c8faba449af480
-
SHA512
0b71e2127c02f001c50b3df0393408a9d0d285850c0622ea0e881101d59a17f445544bb743de271e40282457dff754d298c4192259ed76b9d0986da539b935c5
-
SSDEEP
12288:QEUXlPH1EecQYusd956Zv7mJ58/8xJqUin+AAWy8i1Zhq/:QEUVvmosd956ZqP8ExJqXAQi1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-