General
-
Target
dd434348a4c6c07fe81632199fc222e1_JaffaCakes118
-
Size
939KB
-
Sample
240912-3tey4asbmk
-
MD5
dd434348a4c6c07fe81632199fc222e1
-
SHA1
37fd035068b7c517f831520974defc40fc71cd29
-
SHA256
ff339c6387678ac6ad9e7403a579d0d52dbac97e94b65d0a6a1ea852bd10673a
-
SHA512
5495bd7a276829ab09470dc3854ec64eca30c8ed0a0e0f6d4f3008e29eb435e6b96ff5976ec152fff8d4b5b8cf8ebd84d8d07de0b0a84687071d17868c070c34
-
SSDEEP
12288:BoRXFO85PEKTm9NFDemwzuV59YZVDYH+gTy6hfsnfg+FgDUIpWwiHaBAZV6EG8l:B2c85Pm9NFDSuJeOb+nI+FgDjpWw8Zv/
Static task
static1
Behavioral task
behavioral1
Sample
dd434348a4c6c07fe81632199fc222e1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd434348a4c6c07fe81632199fc222e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
dd434348a4c6c07fe81632199fc222e1_JaffaCakes118
-
Size
939KB
-
MD5
dd434348a4c6c07fe81632199fc222e1
-
SHA1
37fd035068b7c517f831520974defc40fc71cd29
-
SHA256
ff339c6387678ac6ad9e7403a579d0d52dbac97e94b65d0a6a1ea852bd10673a
-
SHA512
5495bd7a276829ab09470dc3854ec64eca30c8ed0a0e0f6d4f3008e29eb435e6b96ff5976ec152fff8d4b5b8cf8ebd84d8d07de0b0a84687071d17868c070c34
-
SSDEEP
12288:BoRXFO85PEKTm9NFDemwzuV59YZVDYH+gTy6hfsnfg+FgDUIpWwiHaBAZV6EG8l:B2c85Pm9NFDSuJeOb+nI+FgDjpWw8Zv/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-