General
-
Target
d5186d86dd0dffbd468963ea8e28cb47_JaffaCakes118
-
Size
1.6MB
-
Sample
240908-z21zraxhpc
-
MD5
d5186d86dd0dffbd468963ea8e28cb47
-
SHA1
e8a2b612d31a70df90febdd0542fe63ae0a034bb
-
SHA256
d29146e5b95389a8038df316270aa4c710d686db36d77e29f91d30f6f771b565
-
SHA512
12c4cd0e7f2d69c370b4d2b94ada374e2f6fa99de2ae7a1d905e4256e04dfad37e14109dbbb9104f41f46565f371ac5d9ab766098c2a8011bf6f3a7002dc2035
-
SSDEEP
49152:vh+ZkldoPKi2a4G/u0UU94VE+syQGxy9/TO:42cPKixEtxxm
Static task
static1
Behavioral task
behavioral1
Sample
d5186d86dd0dffbd468963ea8e28cb47_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5186d86dd0dffbd468963ea8e28cb47_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
d5186d86dd0dffbd468963ea8e28cb47_JaffaCakes118
-
Size
1.6MB
-
MD5
d5186d86dd0dffbd468963ea8e28cb47
-
SHA1
e8a2b612d31a70df90febdd0542fe63ae0a034bb
-
SHA256
d29146e5b95389a8038df316270aa4c710d686db36d77e29f91d30f6f771b565
-
SHA512
12c4cd0e7f2d69c370b4d2b94ada374e2f6fa99de2ae7a1d905e4256e04dfad37e14109dbbb9104f41f46565f371ac5d9ab766098c2a8011bf6f3a7002dc2035
-
SSDEEP
49152:vh+ZkldoPKi2a4G/u0UU94VE+syQGxy9/TO:42cPKixEtxxm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-