General

  • Target

    995f49454cab4d1a79a73620a454a191_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240605-11ldcabd56

  • MD5

    995f49454cab4d1a79a73620a454a191

  • SHA1

    fab9bb3b3d54b5b5fd2dda76469c00820d510439

  • SHA256

    42a79ea60f01d619dd9886f6e37745bfd8783a6c85bcab51b76ee3e2c8e4a26c

  • SHA512

    e7e6f74c38b086afcc823349dbedc4af7c28da00fe966fc7d049705cb86877aeca7e51c657bd7b9f97e5dd1132341c4d09190348b0d67374b9f59e1cbdb559a4

  • SSDEEP

    24576:5PxMfmw1AXiS0rMaqERwrH4wOVfa+vUe/I7YcMUigeVPNDo7zjdrGTjjefU:QRai1vfC0phQ7YcMUigeVlDAzpregU

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dogulumetal.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    DMaslak2950**

Targets

    • Target

      995f49454cab4d1a79a73620a454a191_JaffaCakes118

    • Size

      1.4MB

    • MD5

      995f49454cab4d1a79a73620a454a191

    • SHA1

      fab9bb3b3d54b5b5fd2dda76469c00820d510439

    • SHA256

      42a79ea60f01d619dd9886f6e37745bfd8783a6c85bcab51b76ee3e2c8e4a26c

    • SHA512

      e7e6f74c38b086afcc823349dbedc4af7c28da00fe966fc7d049705cb86877aeca7e51c657bd7b9f97e5dd1132341c4d09190348b0d67374b9f59e1cbdb559a4

    • SSDEEP

      24576:5PxMfmw1AXiS0rMaqERwrH4wOVfa+vUe/I7YcMUigeVPNDo7zjdrGTjjefU:QRai1vfC0phQ7YcMUigeVlDAzpregU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks