General
-
Target
fb3ec34679854d670b13c127b7ee43a2_JaffaCakes118
-
Size
1.5MB
-
Sample
240928-bt7wbszcnk
-
MD5
fb3ec34679854d670b13c127b7ee43a2
-
SHA1
0aec381d8410fa41904f22e03deed04eb7a26ce1
-
SHA256
85852c127c5e69bd9ecf58eb50ed7a628ca2de1250ff8f8b266973ec4c32fd6d
-
SHA512
d12d7dac9f3383e8f05fdc5686d441f86f2df5a2ad1b5e1a77edbe05d3648fd9052b0e855e56217ef0a8f2db53e3221aa8001d8fbe801e0e6c3291cee0a9b464
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1Hom2KXMmHaQoDbReyGiItqC7cVQpDkKpp3ioh6ypZpTQxX:Rh+ZkldoPK8YaQokyGiINIVQpDkKpxDg
Static task
static1
Behavioral task
behavioral1
Sample
fb3ec34679854d670b13c127b7ee43a2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb3ec34679854d670b13c127b7ee43a2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
fb3ec34679854d670b13c127b7ee43a2_JaffaCakes118
-
Size
1.5MB
-
MD5
fb3ec34679854d670b13c127b7ee43a2
-
SHA1
0aec381d8410fa41904f22e03deed04eb7a26ce1
-
SHA256
85852c127c5e69bd9ecf58eb50ed7a628ca2de1250ff8f8b266973ec4c32fd6d
-
SHA512
d12d7dac9f3383e8f05fdc5686d441f86f2df5a2ad1b5e1a77edbe05d3648fd9052b0e855e56217ef0a8f2db53e3221aa8001d8fbe801e0e6c3291cee0a9b464
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1Hom2KXMmHaQoDbReyGiItqC7cVQpDkKpp3ioh6ypZpTQxX:Rh+ZkldoPK8YaQokyGiINIVQpDkKpxDg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops startup file
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-