General

  • Target

    c8d3858bd9a46cf7d187ff76319de971_JaffaCakes118

  • Size

    728KB

  • Sample

    240829-pr17na1hkg

  • MD5

    c8d3858bd9a46cf7d187ff76319de971

  • SHA1

    82decde8004e36fb327d19a87c1e8b462e64f90f

  • SHA256

    ef7f42f8ebfbe4e4067d95271ae8278a1aefe56250f0f34463c7a5ad263e3f72

  • SHA512

    fd7d9c809753536240111dc2c7c53cd1db7a5dc19e10940cced6338164717361910c3353721041c73f8b0eba0aaf83613f183b5d46914a4f0fcd3e3565d51af6

  • SSDEEP

    12288:GAuHRzXMlIGvLG9OgLrNMMfZppd3PSXdFXOzkiM:GAIRzXW6saMSeFXOz/

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    SAIRAM@98765

Targets

    • Target

      c8d3858bd9a46cf7d187ff76319de971_JaffaCakes118

    • Size

      728KB

    • MD5

      c8d3858bd9a46cf7d187ff76319de971

    • SHA1

      82decde8004e36fb327d19a87c1e8b462e64f90f

    • SHA256

      ef7f42f8ebfbe4e4067d95271ae8278a1aefe56250f0f34463c7a5ad263e3f72

    • SHA512

      fd7d9c809753536240111dc2c7c53cd1db7a5dc19e10940cced6338164717361910c3353721041c73f8b0eba0aaf83613f183b5d46914a4f0fcd3e3565d51af6

    • SSDEEP

      12288:GAuHRzXMlIGvLG9OgLrNMMfZppd3PSXdFXOzkiM:GAIRzXW6saMSeFXOz/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks