General

  • Target

    db45193c0f7beea46dda2ee72efa46a9_JaffaCakes118

  • Size

    553KB

  • Sample

    240911-1lmmvsvdre

  • MD5

    db45193c0f7beea46dda2ee72efa46a9

  • SHA1

    00a1877bcc8b94ab78e9e56b3df67bcbece186cd

  • SHA256

    3e0399c730996386f895fb276f727a0dd3095ae40c59ca11b56ed55ae8207285

  • SHA512

    c34260d0ae9e371eb6c6987f9ccae2db21cf3b239046812aad75887808cee6eda12501249c42c7ceb51fd45ef023fe4f44be6c896f864b7f0f460074877a2957

  • SSDEEP

    12288:ksj4nN3zLB/4eym+XDCtdwpV1xijwwmxKUOJSZVoe3lvWRV:kCkN3H2eyj+tGp3wNiNpVoe3lvCV

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.flsrnidth.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    BZ^(npqQ6vPH

Targets

    • Target

      db45193c0f7beea46dda2ee72efa46a9_JaffaCakes118

    • Size

      553KB

    • MD5

      db45193c0f7beea46dda2ee72efa46a9

    • SHA1

      00a1877bcc8b94ab78e9e56b3df67bcbece186cd

    • SHA256

      3e0399c730996386f895fb276f727a0dd3095ae40c59ca11b56ed55ae8207285

    • SHA512

      c34260d0ae9e371eb6c6987f9ccae2db21cf3b239046812aad75887808cee6eda12501249c42c7ceb51fd45ef023fe4f44be6c896f864b7f0f460074877a2957

    • SSDEEP

      12288:ksj4nN3zLB/4eym+XDCtdwpV1xijwwmxKUOJSZVoe3lvWRV:kCkN3H2eyj+tGp3wNiNpVoe3lvCV

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks