General

  • Target

    ef16eaf3a4bd83231defd8ea5e3db940_JaffaCakes118

  • Size

    464KB

  • Sample

    240921-fdvy2swbjk

  • MD5

    ef16eaf3a4bd83231defd8ea5e3db940

  • SHA1

    bd4f3aceac0959c11db6db82fccdb3dfee3c0413

  • SHA256

    cc91f115d2bae877c7b29b2e150743fdc1e3a7aa931829a3694ad3d621a9832f

  • SHA512

    53a02e71196ec2a110760204f578eceb4907ab8e6ca01d10bf80666b4601903d4da3a8bf5f9c9a487107753dbc3c31559989d3629321ae7cd0c9c5d88e10c0e4

  • SSDEEP

    12288:JZ/95om4doP4u3x6PwyEvpBk9WlJM3xnTeEEO9j6R:/8dKP6PepBkWlaBTeEEO9

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Rollingstone147

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Rollingstone147

Targets

    • Target

      ef16eaf3a4bd83231defd8ea5e3db940_JaffaCakes118

    • Size

      464KB

    • MD5

      ef16eaf3a4bd83231defd8ea5e3db940

    • SHA1

      bd4f3aceac0959c11db6db82fccdb3dfee3c0413

    • SHA256

      cc91f115d2bae877c7b29b2e150743fdc1e3a7aa931829a3694ad3d621a9832f

    • SHA512

      53a02e71196ec2a110760204f578eceb4907ab8e6ca01d10bf80666b4601903d4da3a8bf5f9c9a487107753dbc3c31559989d3629321ae7cd0c9c5d88e10c0e4

    • SSDEEP

      12288:JZ/95om4doP4u3x6PwyEvpBk9WlJM3xnTeEEO9j6R:/8dKP6PepBkWlaBTeEEO9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks