General
-
Target
c8c5d0aabc52a56a208a68d1b9160db0_JaffaCakes118
-
Size
677KB
-
Sample
240829-n3s5razera
-
MD5
c8c5d0aabc52a56a208a68d1b9160db0
-
SHA1
0756cd92c2302db55bae81b09af8cb98c4500427
-
SHA256
960bf67766ef78ee40332e6f7fd22445702d3c7e493ca7f2aa6a3dfc48be6f9d
-
SHA512
e75ee84c496275388b48860d97d4924526db89e65ba753ac46f929d06b65a821255e35252ba3c943fb3ec72c6c0ee0a9e7e948d6845db172fe890ae6c38c172b
-
SSDEEP
12288:H1eRRAfxCIUnyNOI/SN/HWQZUpdycXHor8stg3JnB:ViRO8nyNOI0u7BXX
Static task
static1
Behavioral task
behavioral1
Sample
c8c5d0aabc52a56a208a68d1b9160db0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8c5d0aabc52a56a208a68d1b9160db0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
c8c5d0aabc52a56a208a68d1b9160db0_JaffaCakes118
-
Size
677KB
-
MD5
c8c5d0aabc52a56a208a68d1b9160db0
-
SHA1
0756cd92c2302db55bae81b09af8cb98c4500427
-
SHA256
960bf67766ef78ee40332e6f7fd22445702d3c7e493ca7f2aa6a3dfc48be6f9d
-
SHA512
e75ee84c496275388b48860d97d4924526db89e65ba753ac46f929d06b65a821255e35252ba3c943fb3ec72c6c0ee0a9e7e948d6845db172fe890ae6c38c172b
-
SSDEEP
12288:H1eRRAfxCIUnyNOI/SN/HWQZUpdycXHor8stg3JnB:ViRO8nyNOI0u7BXX
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-