General
-
Target
bc845411145abbed32e005d155ea59b8_JaffaCakes118
-
Size
722KB
-
Sample
240618-r7zpwasepk
-
MD5
bc845411145abbed32e005d155ea59b8
-
SHA1
7b6d1989772f48e9bb434c7d3505da5d3c62963f
-
SHA256
0c72e81bc83b1b6b7c7e9d0f17d65ba0d469b5e5035bb4b38aed6728947745b3
-
SHA512
4e045a40f26a482d11a65e29befcf06d5f3bfa53265ee94990a467caf3e3c67c4faf4bfcedb14bc18cd6ef3c04e960a8428169bd023012cf9067d6151be72c29
-
SSDEEP
12288:PcFUncJ54irus265GoqlDX1YH0COI+w7Ror6PpGg+l2K3RYUO6/f76yECdj8V0:VnYnuRcBIoGblBhNj6y/r
Static task
static1
Behavioral task
behavioral1
Sample
bc845411145abbed32e005d155ea59b8_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bc845411145abbed32e005d155ea59b8_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
bc845411145abbed32e005d155ea59b8_JaffaCakes118
-
Size
722KB
-
MD5
bc845411145abbed32e005d155ea59b8
-
SHA1
7b6d1989772f48e9bb434c7d3505da5d3c62963f
-
SHA256
0c72e81bc83b1b6b7c7e9d0f17d65ba0d469b5e5035bb4b38aed6728947745b3
-
SHA512
4e045a40f26a482d11a65e29befcf06d5f3bfa53265ee94990a467caf3e3c67c4faf4bfcedb14bc18cd6ef3c04e960a8428169bd023012cf9067d6151be72c29
-
SSDEEP
12288:PcFUncJ54irus265GoqlDX1YH0COI+w7Ror6PpGg+l2K3RYUO6/f76yECdj8V0:VnYnuRcBIoGblBhNj6y/r
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-