General
-
Target
b9373b09a7284ea1e1d0f4439f0200b1_JaffaCakes118
-
Size
796KB
-
Sample
240617-wbt7qsxgna
-
MD5
b9373b09a7284ea1e1d0f4439f0200b1
-
SHA1
2853cfadae3e3a08d9cc31f87a894986c1bfb13b
-
SHA256
d8f86ddc6f646a987eb2fe7c17addec22346fb12c549bdcacfe27295d36111c4
-
SHA512
d163d202820110b2ca38c745da3f5ff94211ab5f7c2a7b0294ccb1e6a09a2e79d3e02c315f1617ff76c67d712c2fdfe52b17fcbecf68cb88bdd80b91a7ad1b4d
-
SSDEEP
12288:cBW3ydgEMyxPW5FJxko6XJW1MuRVndv3ErN6t8zwpEYFVSLC4UQuczwenBAG2BOK:VymymUW1MuPdv3kIxjcLnBAJBOK
Static task
static1
Behavioral task
behavioral1
Sample
b9373b09a7284ea1e1d0f4439f0200b1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9373b09a7284ea1e1d0f4439f0200b1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
b9373b09a7284ea1e1d0f4439f0200b1_JaffaCakes118
-
Size
796KB
-
MD5
b9373b09a7284ea1e1d0f4439f0200b1
-
SHA1
2853cfadae3e3a08d9cc31f87a894986c1bfb13b
-
SHA256
d8f86ddc6f646a987eb2fe7c17addec22346fb12c549bdcacfe27295d36111c4
-
SHA512
d163d202820110b2ca38c745da3f5ff94211ab5f7c2a7b0294ccb1e6a09a2e79d3e02c315f1617ff76c67d712c2fdfe52b17fcbecf68cb88bdd80b91a7ad1b4d
-
SSDEEP
12288:cBW3ydgEMyxPW5FJxko6XJW1MuRVndv3ErN6t8zwpEYFVSLC4UQuczwenBAG2BOK:VymymUW1MuPdv3kIxjcLnBAJBOK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-