General
-
Target
e7a4adfd262491d1e7671220dc41e458_JaffaCakes118
-
Size
1.5MB
-
Sample
240917-y8sfhstclj
-
MD5
e7a4adfd262491d1e7671220dc41e458
-
SHA1
eb7b3196e464da03710db5230cf51e61a653d2e6
-
SHA256
3363388b66cef6f3af92a059120e6c35d9ad7c3405c6ba75f830f14ce573fefe
-
SHA512
62ed8bdf17d3c6b67f26343061ff1b84bf556f6271e6c8881498a32167354e19c0cdba3481a43a0ef451b8975dec7d0928fda3bf4edb6bcf0f7d6c4533021402
-
SSDEEP
24576:mu6J33O0c+JY5UZ+XC0kGso6Fa9lvYD9yqGEbuv4RhdQPh8WY:ou0c++OCvkGs9Fa9XY
Static task
static1
Behavioral task
behavioral1
Sample
e7a4adfd262491d1e7671220dc41e458_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7a4adfd262491d1e7671220dc41e458_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e7a4adfd262491d1e7671220dc41e458_JaffaCakes118
-
Size
1.5MB
-
MD5
e7a4adfd262491d1e7671220dc41e458
-
SHA1
eb7b3196e464da03710db5230cf51e61a653d2e6
-
SHA256
3363388b66cef6f3af92a059120e6c35d9ad7c3405c6ba75f830f14ce573fefe
-
SHA512
62ed8bdf17d3c6b67f26343061ff1b84bf556f6271e6c8881498a32167354e19c0cdba3481a43a0ef451b8975dec7d0928fda3bf4edb6bcf0f7d6c4533021402
-
SSDEEP
24576:mu6J33O0c+JY5UZ+XC0kGso6Fa9lvYD9yqGEbuv4RhdQPh8WY:ou0c++OCvkGs9Fa9XY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-