General

  • Target

    dac31e0bcbe7ee14a37e90973b3c56c8_JaffaCakes118

  • Size

    957KB

  • Sample

    240911-tz73ds1ekd

  • MD5

    dac31e0bcbe7ee14a37e90973b3c56c8

  • SHA1

    d42122dc4d28ea3991a69f8110429486cc6e3d7b

  • SHA256

    d27811d8d6973b0a3996311ab81217502d9aedc4e9b3fe34c701fb37eadbb8c8

  • SHA512

    dc357a6ffe997daed0be5065a1aab49ea7be0b6c482f9c7d854a539928ccbd1fe14324b63dd6e28dc4211df71e7bdf806a92b2b7d5762487743f56e28eb63e8c

  • SSDEEP

    24576:HlOcanTxmu0u5lfXg4rjIGySXAgGPaOu0rS3kP0:HGtm2fXhIbUAru8SkP0

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.smart-noodles.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    info@#$%^&*()

Targets

    • Target

      dac31e0bcbe7ee14a37e90973b3c56c8_JaffaCakes118

    • Size

      957KB

    • MD5

      dac31e0bcbe7ee14a37e90973b3c56c8

    • SHA1

      d42122dc4d28ea3991a69f8110429486cc6e3d7b

    • SHA256

      d27811d8d6973b0a3996311ab81217502d9aedc4e9b3fe34c701fb37eadbb8c8

    • SHA512

      dc357a6ffe997daed0be5065a1aab49ea7be0b6c482f9c7d854a539928ccbd1fe14324b63dd6e28dc4211df71e7bdf806a92b2b7d5762487743f56e28eb63e8c

    • SSDEEP

      24576:HlOcanTxmu0u5lfXg4rjIGySXAgGPaOu0rS3kP0:HGtm2fXhIbUAru8SkP0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks