General

  • Target

    c8db7a93343ac9b5225971e64aca4aa6_JaffaCakes118

  • Size

    648KB

  • Sample

    240829-p592qasemf

  • MD5

    c8db7a93343ac9b5225971e64aca4aa6

  • SHA1

    ddfb58da5155bdcc7957a3da7fbb1e9a4c8fb02e

  • SHA256

    f9989bce3ddcc0eb0f95bae744a31bd28e06b229f2757ad7fe7a92c8952ac78f

  • SHA512

    ecf28706aa4ab2afc8b764d21fe138ef023c17024ee0bf8a16f6000595ee7bd7534a4341b593b84dce0a20fff07a4d98df6a4b81654291397e5cbf7aea277a8e

  • SSDEEP

    12288:UNmKCvxGbhlCp80NvfwbOO6D6JxzdKBjEf3SlKP1qkIsc:0CpGfL0NvUD6D6JxzygfWKP1PZ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Safirxxx01

Targets

    • Target

      c8db7a93343ac9b5225971e64aca4aa6_JaffaCakes118

    • Size

      648KB

    • MD5

      c8db7a93343ac9b5225971e64aca4aa6

    • SHA1

      ddfb58da5155bdcc7957a3da7fbb1e9a4c8fb02e

    • SHA256

      f9989bce3ddcc0eb0f95bae744a31bd28e06b229f2757ad7fe7a92c8952ac78f

    • SHA512

      ecf28706aa4ab2afc8b764d21fe138ef023c17024ee0bf8a16f6000595ee7bd7534a4341b593b84dce0a20fff07a4d98df6a4b81654291397e5cbf7aea277a8e

    • SSDEEP

      12288:UNmKCvxGbhlCp80NvfwbOO6D6JxzdKBjEf3SlKP1qkIsc:0CpGfL0NvUD6D6JxzygfWKP1PZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks