General

  • Target

    357067685a8a687795276a45aad7d4cc_JaffaCakes118

  • Size

    676KB

  • Sample

    241011-sktqsatenl

  • MD5

    357067685a8a687795276a45aad7d4cc

  • SHA1

    25c1e94ce37ee39b254d08cfdcd7207a35e5650c

  • SHA256

    7aa9168ac939fe52cad38ab87124d3afc732d0ab32ae872731e92fce2bf8e856

  • SHA512

    ea29bd39d081dbcd1d702d46e6391ce2f4ed2819a3083f929f9bff27f87b9f5f7706b0be132dddd98401e89ffebef6dfb7b736bd507f988af8a32f1b768fa592

  • SSDEEP

    12288:fB8QkRRoGkpFPRfVFnyYV7+Zh5YQkBtB6L:f2QkRmGeFPRtjV7+X5YQyB6L

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.chamundeshwari.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    5>KPDhsW

Targets

    • Target

      357067685a8a687795276a45aad7d4cc_JaffaCakes118

    • Size

      676KB

    • MD5

      357067685a8a687795276a45aad7d4cc

    • SHA1

      25c1e94ce37ee39b254d08cfdcd7207a35e5650c

    • SHA256

      7aa9168ac939fe52cad38ab87124d3afc732d0ab32ae872731e92fce2bf8e856

    • SHA512

      ea29bd39d081dbcd1d702d46e6391ce2f4ed2819a3083f929f9bff27f87b9f5f7706b0be132dddd98401e89ffebef6dfb7b736bd507f988af8a32f1b768fa592

    • SSDEEP

      12288:fB8QkRRoGkpFPRfVFnyYV7+Zh5YQkBtB6L:f2QkRmGeFPRtjV7+X5YQyB6L

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks