General

  • Target

    e6236914bbeeb78a29c83c725566eecf_JaffaCakes118

  • Size

    560KB

  • Sample

    240917-f46s8swgqc

  • MD5

    e6236914bbeeb78a29c83c725566eecf

  • SHA1

    d68194ce6b1c2e602315402b702a9550e9d80920

  • SHA256

    b27d82ca7fbe602e095cfb590c472b346b0e4d914a167235be96d00c66041b62

  • SHA512

    6b787725e0e31f9d8b26a0f6a6fbebe0de1ae05e7e856cf5717633b2b65baf9b433c7a9b9ea509e115c4c3304b4ea4f80bbff011f727136b7ca49f14f14e642c

  • SSDEEP

    12288:1bjvk+D+RyXz6hGJHwBndcOX1BqNxpWdbN8u6SxzwxamzKGUoaen:VE4wvVqSbD9uamzvUoX

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    ogb.oils@yandex.com
  • Password:
    Simple262627

Targets

    • Target

      e6236914bbeeb78a29c83c725566eecf_JaffaCakes118

    • Size

      560KB

    • MD5

      e6236914bbeeb78a29c83c725566eecf

    • SHA1

      d68194ce6b1c2e602315402b702a9550e9d80920

    • SHA256

      b27d82ca7fbe602e095cfb590c472b346b0e4d914a167235be96d00c66041b62

    • SHA512

      6b787725e0e31f9d8b26a0f6a6fbebe0de1ae05e7e856cf5717633b2b65baf9b433c7a9b9ea509e115c4c3304b4ea4f80bbff011f727136b7ca49f14f14e642c

    • SSDEEP

      12288:1bjvk+D+RyXz6hGJHwBndcOX1BqNxpWdbN8u6SxzwxamzKGUoaen:VE4wvVqSbD9uamzvUoX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.