General

  • Target

    f8b4f79a32c46e5b6959196be8e7aeea_JaffaCakes118

  • Size

    465KB

  • Sample

    240926-ta64ssycqh

  • MD5

    f8b4f79a32c46e5b6959196be8e7aeea

  • SHA1

    4d82774d359a2082c7114471116bd06f2422b2dd

  • SHA256

    0541ad0262b771da064ddc3b939902047b6716ad73a175052874a3ff370cc4db

  • SHA512

    06759793492b0667b33eb3e31e2c3a3997766a2abc27c32f1fb8819f0a3f67df4ee9570d2a8d291b074fb767479a67aa3c3a538942d68fdce49a51e953ea9cea

  • SSDEEP

    6144:WAa3oTMCoO/lGqRmMZZlUeTQovmYWaq0UFyzInILgdchnIITHJ7lMRicE7E/DxPC:EAMCQA5ZZfTQa3UU5LgqnHx4/BhlAeF

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Everest10

Targets

    • Target

      f8b4f79a32c46e5b6959196be8e7aeea_JaffaCakes118

    • Size

      465KB

    • MD5

      f8b4f79a32c46e5b6959196be8e7aeea

    • SHA1

      4d82774d359a2082c7114471116bd06f2422b2dd

    • SHA256

      0541ad0262b771da064ddc3b939902047b6716ad73a175052874a3ff370cc4db

    • SHA512

      06759793492b0667b33eb3e31e2c3a3997766a2abc27c32f1fb8819f0a3f67df4ee9570d2a8d291b074fb767479a67aa3c3a538942d68fdce49a51e953ea9cea

    • SSDEEP

      6144:WAa3oTMCoO/lGqRmMZZlUeTQovmYWaq0UFyzInILgdchnIITHJ7lMRicE7E/DxPC:EAMCQA5ZZfTQa3UU5LgqnHx4/BhlAeF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks