General

  • Target

    e38c36bc6e5c0c2ab2999f603adfd77b_JaffaCakes118

  • Size

    868KB

  • Sample

    240915-24p2daxbna

  • MD5

    e38c36bc6e5c0c2ab2999f603adfd77b

  • SHA1

    1fe6ce11d04841b5ad11335bfa07c54c3fd8de46

  • SHA256

    0f7fbfe6bfd65c275278c0e4d96932a5dd15dac0c6b72ebbb99caa5f2b64f5f8

  • SHA512

    ee7235403d1be2272575bbe869ec31a493dae753d97bd324d1e3af17aeb006ff783313d90e518aa1b935b1c8c0992d588bc037182328f9fca1c2d065a1bc4bbc

  • SSDEEP

    24576:65ClWXRgX5HvxURCBX2m6wkCH1Brk/mqm:65CIEHvFBXAw3Tk/vm

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.prcpl.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    jyotika@2015

Targets

    • Target

      Overdue Account.exe

    • Size

      1.1MB

    • MD5

      cd8b7c72ba0756f8e6477259d399b960

    • SHA1

      d3e9536cbe68699c134823f4730e9a388b403b3b

    • SHA256

      e50738bd86a1d753a2ccf0e88cfca85fb58986ce16cb9db779e3cbb45e9a4c07

    • SHA512

      0abb609b0d5d946ff7a1c884bc533cf764d92e706cca9438e10b45570af402b3e29defc70770b31a716b93676305fdec142cb0f15ac493a82d2cddaa544e5f46

    • SSDEEP

      24576:KyBLjP6+b1EyCGcZV/zerKsAEUVTa9hJz7H:rP1MT/SujEQTKD7H

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks