General

  • Target

    dfd180fbf4b40a7d1a652a7443e6371a_JaffaCakes118

  • Size

    943KB

  • Sample

    240914-kcg31svclq

  • MD5

    dfd180fbf4b40a7d1a652a7443e6371a

  • SHA1

    760a8a2d851aa3cf76c6dc2a5380b53c8f506e63

  • SHA256

    7e0a740a561dd3f6ce599f1d6abe946addce41d7326be0daf860405fb5377b07

  • SHA512

    007495fde34756e4c0a140d957b3e302323851bc980d6533bd7894fe4808921b1ab6fc1b79ac023e1f78a6dba02c62acc0354fae601c328dd9e2b40b49d28c80

  • SSDEEP

    24576:jbFKLriziS1NtoqrITO8rE79mhZoAT6QCLBiAsiBVzYZ6:wi/tPcTZrEs+DBiEH

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sky-qrp.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    h!xUls&%FS,V

Targets

    • Target

      dfd180fbf4b40a7d1a652a7443e6371a_JaffaCakes118

    • Size

      943KB

    • MD5

      dfd180fbf4b40a7d1a652a7443e6371a

    • SHA1

      760a8a2d851aa3cf76c6dc2a5380b53c8f506e63

    • SHA256

      7e0a740a561dd3f6ce599f1d6abe946addce41d7326be0daf860405fb5377b07

    • SHA512

      007495fde34756e4c0a140d957b3e302323851bc980d6533bd7894fe4808921b1ab6fc1b79ac023e1f78a6dba02c62acc0354fae601c328dd9e2b40b49d28c80

    • SSDEEP

      24576:jbFKLriziS1NtoqrITO8rE79mhZoAT6QCLBiAsiBVzYZ6:wi/tPcTZrEs+DBiEH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks