General

  • Target

    dab916e4d0746060c601dc67f518c1cd_JaffaCakes118

  • Size

    688KB

  • Sample

    240911-tkkcsazbrr

  • MD5

    dab916e4d0746060c601dc67f518c1cd

  • SHA1

    f77f4275268fc3117e7a7b638d3e2c5804ddab4b

  • SHA256

    e528bc13b83f49c42230bd4c2f4279c187c0bab57b872e9ca152b52a395c316e

  • SHA512

    e6f5a652fe7cf8e1c7ec93dfaedc6193174249ca07bd4bf0a7acb88b7858dd054ffcbd5c5254061f6b18e5816a79334ffe74f0193a2feac6fffe63ae1e20079d

  • SSDEEP

    12288:p38MyQB3qyyvP8fhBGA5Oya/DiyA6GkW6CH0HyrQHv3iXL13Q/C8YlO5nERtI:zB3qTP8fJtuRYP64lru3iXLhQ/7nEc

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://files.000webhost.com/
  • Port:
    21
  • Username:
    zinco
  • Password:
    computer147

Targets

    • Target

      Additional documents.exe

    • Size

      883KB

    • MD5

      9ce7dbaa399c553d3fbeae037b810085

    • SHA1

      474b5c31ccd81f0e4fa74066b02595bf4648bc5b

    • SHA256

      c2ae8f03a4c70c1a976ab882238a8df26aebc713cd28e1896f883ea9da1f76de

    • SHA512

      ae079383015a9e0fb971d8ff7d77d712fe93d6b6c8aef6e20584308fbfb9b6429c2b299270a7361959dc7217b190458f3cfcd3bb2081069c81df50a68d7af693

    • SSDEEP

      24576:SUutasoWS0F8JVJu9Yna8PrGJ0XHLC/bqx:SUuYsDl+rJugFGJ0WW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks