General

  • Target

    cc88c1ddff516c4f629c305ae04b1770_JaffaCakes118

  • Size

    688KB

  • Sample

    240831-k498wawdnp

  • MD5

    cc88c1ddff516c4f629c305ae04b1770

  • SHA1

    046b90fc5614b50a5efab364e7b5889c13730f41

  • SHA256

    8f128126322df89a84daeff6e86a4b50345505cd5ac83cde439a810c482ae9e5

  • SHA512

    f43092602fa7d68881d72deda6f7895be1a1768de386603cb32ed2ebf9f3c4cbd1bd5513a094f05dc27acf9452dd6f02ca8cee68d27283b42d80f2af4420d7c1

  • SSDEEP

    12288:V+qTnDZwmVXYjW5ITa4HxGbhs6zC8ILPZglgbelNrZsQAOf/dE3VRWnBjizXszMp:OTRG2PZNbe1sQAK/dcRUiE

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Simple262627

Targets

    • Target

      cc88c1ddff516c4f629c305ae04b1770_JaffaCakes118

    • Size

      688KB

    • MD5

      cc88c1ddff516c4f629c305ae04b1770

    • SHA1

      046b90fc5614b50a5efab364e7b5889c13730f41

    • SHA256

      8f128126322df89a84daeff6e86a4b50345505cd5ac83cde439a810c482ae9e5

    • SHA512

      f43092602fa7d68881d72deda6f7895be1a1768de386603cb32ed2ebf9f3c4cbd1bd5513a094f05dc27acf9452dd6f02ca8cee68d27283b42d80f2af4420d7c1

    • SSDEEP

      12288:V+qTnDZwmVXYjW5ITa4HxGbhs6zC8ILPZglgbelNrZsQAOf/dE3VRWnBjizXszMp:OTRG2PZNbe1sQAK/dcRUiE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks