General
-
Target
f2ce6c24a7e97ec4cf28e58c6553ac95_JaffaCakes118
-
Size
1.5MB
-
Sample
240923-wfkh4avgmk
-
MD5
f2ce6c24a7e97ec4cf28e58c6553ac95
-
SHA1
98d8ff44203ad85086106067260ee0e89bf5f34d
-
SHA256
ce509cb9a13b8ed813ee7e8d9d926f013fe073b032c2802e131c7eef8ce66dc3
-
SHA512
1b97aee2c506be4c28199de8e026b70b9d0829fdc46dded9c3ac5259cf83b3abc2943307c3cc3c29eb34f6994d427ea8ace0d0b2110438d823821958d1bff121
-
SSDEEP
24576:au6Jx3O0c+JY5UZ+XC0kGso/Wa98x5ZSOvu0XQaWY:sI0c++OCvkGsUWa9DY
Static task
static1
Behavioral task
behavioral1
Sample
f2ce6c24a7e97ec4cf28e58c6553ac95_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2ce6c24a7e97ec4cf28e58c6553ac95_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f2ce6c24a7e97ec4cf28e58c6553ac95_JaffaCakes118
-
Size
1.5MB
-
MD5
f2ce6c24a7e97ec4cf28e58c6553ac95
-
SHA1
98d8ff44203ad85086106067260ee0e89bf5f34d
-
SHA256
ce509cb9a13b8ed813ee7e8d9d926f013fe073b032c2802e131c7eef8ce66dc3
-
SHA512
1b97aee2c506be4c28199de8e026b70b9d0829fdc46dded9c3ac5259cf83b3abc2943307c3cc3c29eb34f6994d427ea8ace0d0b2110438d823821958d1bff121
-
SSDEEP
24576:au6Jx3O0c+JY5UZ+XC0kGso/Wa98x5ZSOvu0XQaWY:sI0c++OCvkGsUWa9DY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops startup file
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-