General

  • Target

    f324cbaf1c92792f38cdd8802ec58a0f_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240924-jhflpszbqg

  • MD5

    f324cbaf1c92792f38cdd8802ec58a0f

  • SHA1

    30e100ef237ad3772ab983d7b741a8c017ad4f70

  • SHA256

    81c2a7b3b6d086433a381e18410566eeb4b6eab9703fdd6cd1bc722f3699feb4

  • SHA512

    9b2e80a85901e59348b762d4b487c4001000c30f95fceb5e91097cccfa487a56abc57806e08acb3b87655424a9f4a604d39ac4df22110e196dca13574379a823

  • SSDEEP

    12288:8NF5hNvXKJEp1lLNFn5I79IytGBFXa9PSYWhYYT2:8NF5hVXthLXn5+IytGBFXa

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gandi.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Blessed000@

Targets

    • Target

      PO#LT40097_pdf.scr

    • Size

      1008KB

    • MD5

      81fa103169694ade60435f1d37558629

    • SHA1

      c1d05d8f37ac93c965f6af66bfcfc93870c44b48

    • SHA256

      ca967b546580c35933e3b620342056f75a14168f821dc8ef18f5fc99eed34130

    • SHA512

      8b29597cbd58b7d7b644188ac757bd19d53284e03fb998c921532d30140604c5c97e9fa09a862442cdc51da32438eecb01609fb71f8716a5b2bf31bc0c360e0c

    • SSDEEP

      12288:9NF5hNvXKJEp1lLNFn5I79IytGBFXa9PSYWhYYT2:9NF5hVXthLXn5+IytGBFXa

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks