General

  • Target

    eccb913a135dac83f1bbc30fae5e20c6_JaffaCakes118

  • Size

    516KB

  • Sample

    240920-egekssxcjd

  • MD5

    eccb913a135dac83f1bbc30fae5e20c6

  • SHA1

    7a1b0f1fcb83671e8efa82358ca987df303ea55e

  • SHA256

    f79abc0493c0ff913ace29f572b8914c72cef471a08a6cf8ffdfe5e622060c0b

  • SHA512

    9eb8d0690c7727ada57f73fae290ac30ef82c70e03cc943194ed1275e6be58969174637616b572efcbe34e8fc92eea1080a9a814873c221d85e4f1805d1a43a0

  • SSDEEP

    12288:bzwZmLyX8tz9W5gUsKKRw+DjfCmgW+oSlMlNU6eCJ:bIQO8tBWfCRrDjr+JMrUoJ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.tonytonero.biz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    XKdnVrM1

Targets

    • Target

      PO.exe

    • Size

      680KB

    • MD5

      bfd4641dbe5257b5857c2602ea7b2a73

    • SHA1

      9b159263372249b57781100d24d5baad12f978a4

    • SHA256

      efb743ce3a7a97e5611ae39b006a8489d5c573eec8bde5f7df3c67210d4c309b

    • SHA512

      ced64c7a825589ed83e00516e02b50db608e4ba2bfdd2e5ebaabf92d7da3a0c40123583174cb8f44a84499de00e9aba6d797b48c3ab82e340f05cad86f199931

    • SSDEEP

      12288:JPchekXkOa0RLGdYylGc1GT7Z6ZFPqbCAM3E413vCzEzoApCJWX0nSxZYc:qhxKdYJcJDqbCAsCuXp8WX0Sxt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks