General
-
Target
f8060f5e2afbac91584c487be894b767_JaffaCakes118
-
Size
697KB
-
Sample
240926-k1c4za1gjc
-
MD5
f8060f5e2afbac91584c487be894b767
-
SHA1
a69bec5e4b1124d6e5501c5d6690fc1f1f8a8734
-
SHA256
a921089f3327d511043c7feffed9985bfb3a7ca5ee43e0724c344ad8cb63fbf5
-
SHA512
da217d4e52342d2e7bc61cb54f3581380817fc3836b6e0c2117cf77c32a5862d436b06a75c29643a9e305cd05aa15c097bb12027754153099a71b93d7baad431
-
SSDEEP
12288:U59M/CUUzFaobCO4kBSzCg6UPH//tg+QZYhSQPupMs+uOVPX8I:UrYUhzRsCg6Yn++QKSMMMs+3
Static task
static1
Behavioral task
behavioral1
Sample
f8060f5e2afbac91584c487be894b767_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f8060f5e2afbac91584c487be894b767_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f8060f5e2afbac91584c487be894b767_JaffaCakes118
-
Size
697KB
-
MD5
f8060f5e2afbac91584c487be894b767
-
SHA1
a69bec5e4b1124d6e5501c5d6690fc1f1f8a8734
-
SHA256
a921089f3327d511043c7feffed9985bfb3a7ca5ee43e0724c344ad8cb63fbf5
-
SHA512
da217d4e52342d2e7bc61cb54f3581380817fc3836b6e0c2117cf77c32a5862d436b06a75c29643a9e305cd05aa15c097bb12027754153099a71b93d7baad431
-
SSDEEP
12288:U59M/CUUzFaobCO4kBSzCg6UPH//tg+QZYhSQPupMs+uOVPX8I:UrYUhzRsCg6Yn++QKSMMMs+3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-