General
-
Target
f3f816f1b16c123bf8d56c69dd02b817_JaffaCakes118
-
Size
415KB
-
Sample
240924-s4mrks1erk
-
MD5
f3f816f1b16c123bf8d56c69dd02b817
-
SHA1
52bd09b5bba3d7736c917950d4172dca4129307a
-
SHA256
6eb8b7ec8db012b974a8c8fe674ffd3e93cbb7490281be3de24e0ae27400bee3
-
SHA512
509e8947a8ecd109ea01b9a186ef6352b57a87109e132f845ccda17392c09ee4a517c72de57cec7705b315495951967871f7610f7110969bf5df5a20feff1fe9
-
SSDEEP
12288:x6df7PM6ZrEYICCuqUKbiyDnR/umNao9:I5bZJQey
Static task
static1
Behavioral task
behavioral1
Sample
f3f816f1b16c123bf8d56c69dd02b817_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3f816f1b16c123bf8d56c69dd02b817_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f3f816f1b16c123bf8d56c69dd02b817_JaffaCakes118
-
Size
415KB
-
MD5
f3f816f1b16c123bf8d56c69dd02b817
-
SHA1
52bd09b5bba3d7736c917950d4172dca4129307a
-
SHA256
6eb8b7ec8db012b974a8c8fe674ffd3e93cbb7490281be3de24e0ae27400bee3
-
SHA512
509e8947a8ecd109ea01b9a186ef6352b57a87109e132f845ccda17392c09ee4a517c72de57cec7705b315495951967871f7610f7110969bf5df5a20feff1fe9
-
SSDEEP
12288:x6df7PM6ZrEYICCuqUKbiyDnR/umNao9:I5bZJQey
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1