General

  • Target

    f547b51cdf7d2d143b1cbe47d493f6b0_JaffaCakes118

  • Size

    668KB

  • Sample

    240925-f3mzqsxdmr

  • MD5

    f547b51cdf7d2d143b1cbe47d493f6b0

  • SHA1

    013fc6ce63a18928d1176d56d9bf713e9673ac32

  • SHA256

    231cbb65ca53f39122fe422f9eecfd39867bac941d378aeb6502415fd83b4ea5

  • SHA512

    02fda7de75cf0b10c3d7b5c7273b63be8e326c6325dabe2b49596136a2da06f77aa61ad501238f23f9d88ccc48afb31ee2ba7393d1c02082f8d06d0bb7351c46

  • SSDEEP

    12288:2UgA+ktHA7cVCs35IkohqRXRZMRRto9E+KQOYAn5h2B3tdx3ACEQAEaYI3yQ5/4e:yFrs3XoiLMRRlD35y3tXQv

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ablegod1

Targets

    • Target

      f547b51cdf7d2d143b1cbe47d493f6b0_JaffaCakes118

    • Size

      668KB

    • MD5

      f547b51cdf7d2d143b1cbe47d493f6b0

    • SHA1

      013fc6ce63a18928d1176d56d9bf713e9673ac32

    • SHA256

      231cbb65ca53f39122fe422f9eecfd39867bac941d378aeb6502415fd83b4ea5

    • SHA512

      02fda7de75cf0b10c3d7b5c7273b63be8e326c6325dabe2b49596136a2da06f77aa61ad501238f23f9d88ccc48afb31ee2ba7393d1c02082f8d06d0bb7351c46

    • SSDEEP

      12288:2UgA+ktHA7cVCs35IkohqRXRZMRRto9E+KQOYAn5h2B3tdx3ACEQAEaYI3yQ5/4e:yFrs3XoiLMRRlD35y3tXQv

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks