General

  • Target

    f720dc75b1260f81bf74e258b6793f6d_JaffaCakes118

  • Size

    392KB

  • Sample

    240926-adts4avgqj

  • MD5

    f720dc75b1260f81bf74e258b6793f6d

  • SHA1

    b352d5ced8b1648f8448a116fe0ca59310a7c191

  • SHA256

    e11736f470654e19618c67d3a63e705bcfa9f854dd0345abb121992fb5019cf3

  • SHA512

    c64563e45efea99e3bc8b17c105a2a44b9965e156cab83f8cee4665cd5ef3adbfc88d87c4100446006b85ee4b8fa8a21385d555e03689d4720d4e3b6164edfdd

  • SSDEEP

    12288:A7J6H3twmbZyw8nLWcn/TQTZKNY0oQghPDPM:A7J6SIwvT/290TghQ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ejazontheweb.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    t%[D2FmSeQezu,}e

Targets

    • Target

      f720dc75b1260f81bf74e258b6793f6d_JaffaCakes118

    • Size

      392KB

    • MD5

      f720dc75b1260f81bf74e258b6793f6d

    • SHA1

      b352d5ced8b1648f8448a116fe0ca59310a7c191

    • SHA256

      e11736f470654e19618c67d3a63e705bcfa9f854dd0345abb121992fb5019cf3

    • SHA512

      c64563e45efea99e3bc8b17c105a2a44b9965e156cab83f8cee4665cd5ef3adbfc88d87c4100446006b85ee4b8fa8a21385d555e03689d4720d4e3b6164edfdd

    • SSDEEP

      12288:A7J6H3twmbZyw8nLWcn/TQTZKNY0oQghPDPM:A7J6SIwvT/290TghQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • AgentTesla payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks