General

  • Target

    b31a6798b0ff3238addb874bf8eb7950_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240616-mtnm8sthkj

  • MD5

    b31a6798b0ff3238addb874bf8eb7950

  • SHA1

    11df2edaafcf514782933dfe5d49a26436069028

  • SHA256

    d49cc06b3345c9e1ef413d9ed3c3d24e0ca4ed591b9675a60d3682c137aa4506

  • SHA512

    110f725fd5bc63db2caae4779a48b1d3bff6696790f5d901330ebca7f96dfb7f9d9b403123d944b23fb9306e5199b51254abbcfa435263b11b914e23b39a4f3e

  • SSDEEP

    12288:3G+PP46BWuOl82dbAIxv3c6oHG3pfTwMGnDheeM7YN43ixIzFGAby7E3yr3rxcuK:35PXEtDUY0DEXmeYeQbtAE7nsLd

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cominf.ro
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    a123456!

Targets

    • Target

      b31a6798b0ff3238addb874bf8eb7950_JaffaCakes118

    • Size

      1.1MB

    • MD5

      b31a6798b0ff3238addb874bf8eb7950

    • SHA1

      11df2edaafcf514782933dfe5d49a26436069028

    • SHA256

      d49cc06b3345c9e1ef413d9ed3c3d24e0ca4ed591b9675a60d3682c137aa4506

    • SHA512

      110f725fd5bc63db2caae4779a48b1d3bff6696790f5d901330ebca7f96dfb7f9d9b403123d944b23fb9306e5199b51254abbcfa435263b11b914e23b39a4f3e

    • SSDEEP

      12288:3G+PP46BWuOl82dbAIxv3c6oHG3pfTwMGnDheeM7YN43ixIzFGAby7E3yr3rxcuK:35PXEtDUY0DEXmeYeQbtAE7nsLd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks