General
-
Target
e3dfe17627bc8df5acd6831af0756d93_JaffaCakes118
-
Size
284KB
-
Sample
240916-c9rpqawbmj
-
MD5
e3dfe17627bc8df5acd6831af0756d93
-
SHA1
b197f62f88e46b63e10e5274adcc0e27046be7a2
-
SHA256
0d67587156a5826a47454eee056eae0a2ab16207f98d2d0580f14becfe6ffa3b
-
SHA512
d412ac330fe460dd6b58d5c91fa52ce26e74c18ffb46d279dced8a31fe768a91126838e96e9c58b23b0181c1b6420388300bcbe76553c4311bd60e54a01fa08a
-
SSDEEP
6144:HicAklDW5U0PBQWFYKGzjd8nRgVTOeqCGwIYE:HiIpW5BBxFYK8j+KffDE
Static task
static1
Behavioral task
behavioral1
Sample
e3dfe17627bc8df5acd6831af0756d93_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3dfe17627bc8df5acd6831af0756d93_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e3dfe17627bc8df5acd6831af0756d93_JaffaCakes118
-
Size
284KB
-
MD5
e3dfe17627bc8df5acd6831af0756d93
-
SHA1
b197f62f88e46b63e10e5274adcc0e27046be7a2
-
SHA256
0d67587156a5826a47454eee056eae0a2ab16207f98d2d0580f14becfe6ffa3b
-
SHA512
d412ac330fe460dd6b58d5c91fa52ce26e74c18ffb46d279dced8a31fe768a91126838e96e9c58b23b0181c1b6420388300bcbe76553c4311bd60e54a01fa08a
-
SSDEEP
6144:HicAklDW5U0PBQWFYKGzjd8nRgVTOeqCGwIYE:HiIpW5BBxFYK8j+KffDE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1