General
-
Target
cdc6d2fda7f51c7b9e7911f52fdad413_JaffaCakes118
-
Size
592KB
-
Sample
240831-25152a1bmk
-
MD5
cdc6d2fda7f51c7b9e7911f52fdad413
-
SHA1
f24536404b038157254ac89e9972851cb0a44e8d
-
SHA256
4976d7941500393fd1c39d01900d11cf9a787c3158966867096d1cfc3ae0c6cd
-
SHA512
e68c01abc33fe688e2ce0b54cc06c0caa3e566bcb456e3a997ebbf146a44f169e9e879aad3f71bfb4dc395e9ddc452ea9b54e9845df312e8ad4e196b32c7b76c
-
SSDEEP
12288:R9BviDQsHbMqmmJRgiAP83MbzyBA8oNLki2ey9XrU03rNN6:Rfw/Hb2mQ9MmgCLd87U0
Static task
static1
Behavioral task
behavioral1
Sample
cdc6d2fda7f51c7b9e7911f52fdad413_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cdc6d2fda7f51c7b9e7911f52fdad413_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
cdc6d2fda7f51c7b9e7911f52fdad413_JaffaCakes118
-
Size
592KB
-
MD5
cdc6d2fda7f51c7b9e7911f52fdad413
-
SHA1
f24536404b038157254ac89e9972851cb0a44e8d
-
SHA256
4976d7941500393fd1c39d01900d11cf9a787c3158966867096d1cfc3ae0c6cd
-
SHA512
e68c01abc33fe688e2ce0b54cc06c0caa3e566bcb456e3a997ebbf146a44f169e9e879aad3f71bfb4dc395e9ddc452ea9b54e9845df312e8ad4e196b32c7b76c
-
SSDEEP
12288:R9BviDQsHbMqmmJRgiAP83MbzyBA8oNLki2ey9XrU03rNN6:Rfw/Hb2mQ9MmgCLd87U0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-