General

  • Target

    1515d4575f651de0cf97c6d26af7f540_JaffaCakes118

  • Size

    702KB

  • Sample

    240329-bt91paed97

  • MD5

    1515d4575f651de0cf97c6d26af7f540

  • SHA1

    e7e3855eafe2e436117fd9f8c27048a6af4962c7

  • SHA256

    5cfa399db38ddded208036cb0532b2cec2723f6e3895ba43eb08810226187d6f

  • SHA512

    f7c23b15728ae43ba336668e28a2280dd9e047adc622f1e07eade6240ec9e750d4d6a665d6a94324158c7c2beb984a80a7cc9617ee89f751139eeb280d6d570a

  • SSDEEP

    12288:k/+qRSweZ5vnctrZZy4ToT68d/GQfntm7paQAlHVdMkuvMNptn0U9qJFTP8:k/RH+5ktrZRTit/nk4QAl1vaUqQ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    qHuEFqv8

Targets

    • Target

      1515d4575f651de0cf97c6d26af7f540_JaffaCakes118

    • Size

      702KB

    • MD5

      1515d4575f651de0cf97c6d26af7f540

    • SHA1

      e7e3855eafe2e436117fd9f8c27048a6af4962c7

    • SHA256

      5cfa399db38ddded208036cb0532b2cec2723f6e3895ba43eb08810226187d6f

    • SHA512

      f7c23b15728ae43ba336668e28a2280dd9e047adc622f1e07eade6240ec9e750d4d6a665d6a94324158c7c2beb984a80a7cc9617ee89f751139eeb280d6d570a

    • SSDEEP

      12288:k/+qRSweZ5vnctrZZy4ToT68d/GQfntm7paQAlHVdMkuvMNptn0U9qJFTP8:k/RH+5ktrZRTit/nk4QAl1vaUqQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks