General

  • Target

    fe9c50bc297b2d678050226a23b02442_JaffaCakes118

  • Size

    712KB

  • Sample

    240929-qj9z9swbqj

  • MD5

    fe9c50bc297b2d678050226a23b02442

  • SHA1

    4adb854d3c46f1d952e99c244c52c3a952d66967

  • SHA256

    7b0a23e523d1947d62a47bf8260d031a5ef93fd54bc0ada0cb2b0aa43d7df918

  • SHA512

    125313b4fcf4e1bbc2897e5e1ec98a9593290a80013a73aca25e9fb1d096ac1965708170e5dafc69bcccf1f97ecd805112221fb76a630a6fa1b4edc25e6e3bbb

  • SSDEEP

    12288:Tk7g5+rgIAcK5N8+vifZhHDAtflk+a4m+M7VTPtjT67K5K3tAegdVSBzLyo:o7g5+r7k8xhhHDclk+aJz9pyj0Geo

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.smart-noodles.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    info@#$%^&*()

Targets

    • Target

      order.exe

    • Size

      1.0MB

    • MD5

      ab1a6b8171f7a1efcb1600b49dfdd234

    • SHA1

      f33bb81ccc85722f746980bb1b5aee8033aa4de7

    • SHA256

      01cd063d42c49b0612db611805a26403a9418e18f683321012809158bbd27742

    • SHA512

      d86e423e05dea38700c0452f2fe9fdd33f0d5c70f3df00681c359cbd72853ea01e900c9797e1cc78f3387060470fa62d383df1dde8ead184bac43c68ec2d1506

    • SSDEEP

      24576:ayBcjP6+BO3gdnpGL/QKxP4PH+0Cn3SB:Q9O30+IKxv043S

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks