General

  • Target

    d04f057f91df698eeb348e5ba5effeec_JaffaCakes118

  • Size

    523KB

  • Sample

    240906-x9qsmsthmq

  • MD5

    d04f057f91df698eeb348e5ba5effeec

  • SHA1

    faa844cfcc112261e57507a45539c66f2d4d446e

  • SHA256

    fcdc7ce7c111217b3890be38333ca52d829eadb9ea7993f981b9a2024e763465

  • SHA512

    a69bd6a8e3d61c50435e97fe5a97c24c3cf9fc7c18aab137e6d6831fb38fa5b336663d0710d383de086a659ee9ce44d0b2329a6e48cb25271398349cdcc06422

  • SSDEEP

    6144:9eKDtDwC6hJTYQJMVMPvq3AwZQQHA6WFKbTSnl2Toy3Uxo+wHEAIh8KqdyqVxugx:kUz6hGQ6mAF5/bGlN2U+0h8TZRoTqOw

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.curidesigner.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    boygirl123456

Targets

    • Target

      d04f057f91df698eeb348e5ba5effeec_JaffaCakes118

    • Size

      523KB

    • MD5

      d04f057f91df698eeb348e5ba5effeec

    • SHA1

      faa844cfcc112261e57507a45539c66f2d4d446e

    • SHA256

      fcdc7ce7c111217b3890be38333ca52d829eadb9ea7993f981b9a2024e763465

    • SHA512

      a69bd6a8e3d61c50435e97fe5a97c24c3cf9fc7c18aab137e6d6831fb38fa5b336663d0710d383de086a659ee9ce44d0b2329a6e48cb25271398349cdcc06422

    • SSDEEP

      6144:9eKDtDwC6hJTYQJMVMPvq3AwZQQHA6WFKbTSnl2Toy3Uxo+wHEAIh8KqdyqVxugx:kUz6hGQ6mAF5/bGlN2U+0h8TZRoTqOw

MITRE ATT&CK Enterprise v15

Tasks