General

  • Target

    f7eb3dac5c5fe26865ed2b8724d71227_JaffaCakes118

  • Size

    723KB

  • Sample

    240926-jtv6jawckj

  • MD5

    f7eb3dac5c5fe26865ed2b8724d71227

  • SHA1

    1f2a69cbbcd9a761184bf06ae80afa0aed7dc4ad

  • SHA256

    30673ca4675d75d6597d5a1bc76ada58e20603961532bd0dcd429fe7879a73f0

  • SHA512

    926d5da446882d1fe28b47041e3e12a84bdb338e08bfaba48dd87262cd4caf563b446b35eb18639537a9f40c7f0680135a3cb003ba10948e69f3174ecb9b5d24

  • SSDEEP

    12288:pBLZi970Oz6hGy01Oc0D8E40XpXyxnY2b0d3qpLvEQm103pJ5:DLZ7AOHoWXpUY534qmpJ5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @Mexico1.,

Targets

    • Target

      f7eb3dac5c5fe26865ed2b8724d71227_JaffaCakes118

    • Size

      723KB

    • MD5

      f7eb3dac5c5fe26865ed2b8724d71227

    • SHA1

      1f2a69cbbcd9a761184bf06ae80afa0aed7dc4ad

    • SHA256

      30673ca4675d75d6597d5a1bc76ada58e20603961532bd0dcd429fe7879a73f0

    • SHA512

      926d5da446882d1fe28b47041e3e12a84bdb338e08bfaba48dd87262cd4caf563b446b35eb18639537a9f40c7f0680135a3cb003ba10948e69f3174ecb9b5d24

    • SSDEEP

      12288:pBLZi970Oz6hGy01Oc0D8E40XpXyxnY2b0d3qpLvEQm103pJ5:DLZ7AOHoWXpUY534qmpJ5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks