General
-
Target
d47f2a878c8df44243db55f77eba4144_JaffaCakes118
-
Size
455KB
-
Sample
240908-q2lema1fre
-
MD5
d47f2a878c8df44243db55f77eba4144
-
SHA1
6c13d2c78c0435bea621d08e40b5bec744cbd062
-
SHA256
3908bfd056ef656e963f85ae88687456614af5df3174785fc12864ed0bd5b5fe
-
SHA512
7c2ec2fb6b61ca033e894a675ea596101e40011dd458bc252cbddfa3f5141847bddd262695b39d4a61fd26af11590ae8d186ae750ef686fa1116c2b27ceb2439
-
SSDEEP
12288:JpnXBbR+DSeYBljju9RpOD/kBwcmNao06DE:bXBfjypnwJ
Static task
static1
Behavioral task
behavioral1
Sample
d47f2a878c8df44243db55f77eba4144_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d47f2a878c8df44243db55f77eba4144_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
d47f2a878c8df44243db55f77eba4144_JaffaCakes118
-
Size
455KB
-
MD5
d47f2a878c8df44243db55f77eba4144
-
SHA1
6c13d2c78c0435bea621d08e40b5bec744cbd062
-
SHA256
3908bfd056ef656e963f85ae88687456614af5df3174785fc12864ed0bd5b5fe
-
SHA512
7c2ec2fb6b61ca033e894a675ea596101e40011dd458bc252cbddfa3f5141847bddd262695b39d4a61fd26af11590ae8d186ae750ef686fa1116c2b27ceb2439
-
SSDEEP
12288:JpnXBbR+DSeYBljju9RpOD/kBwcmNao06DE:bXBfjypnwJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-