General
-
Target
e45d320e262c21268c2711e3abdfdde3_JaffaCakes118
-
Size
722KB
-
Sample
240916-j78nsaxfll
-
MD5
e45d320e262c21268c2711e3abdfdde3
-
SHA1
478cf861c91216e510a7cb04e48691c6375ca63d
-
SHA256
942f7d551ae6e745c79933ea717d89758c09a5a6bb1135e97002c0614430d71c
-
SHA512
cc5bb391c18e15bf54fbed818f847427d02f7836c0af67b1ab304e5af53b13d03aa17ab0e8b7e6cf60b3b231d0cae5e79e3b5a49b55c9e36ff16dadf27ddb8fc
-
SSDEEP
12288:in/P3vqT1WES8G43JBiSRQpERSaweInS/5alfPLS4FOb/FhCsvysdDDb9sS:63y9zZ3JBpRUgSa1Bak4Q5y+DDbe
Static task
static1
Behavioral task
behavioral1
Sample
e45d320e262c21268c2711e3abdfdde3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e45d320e262c21268c2711e3abdfdde3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e45d320e262c21268c2711e3abdfdde3_JaffaCakes118
-
Size
722KB
-
MD5
e45d320e262c21268c2711e3abdfdde3
-
SHA1
478cf861c91216e510a7cb04e48691c6375ca63d
-
SHA256
942f7d551ae6e745c79933ea717d89758c09a5a6bb1135e97002c0614430d71c
-
SHA512
cc5bb391c18e15bf54fbed818f847427d02f7836c0af67b1ab304e5af53b13d03aa17ab0e8b7e6cf60b3b231d0cae5e79e3b5a49b55c9e36ff16dadf27ddb8fc
-
SSDEEP
12288:in/P3vqT1WES8G43JBiSRQpERSaweInS/5alfPLS4FOb/FhCsvysdDDb9sS:63y9zZ3JBpRUgSa1Bak4Q5y+DDbe
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-