General

  • Target

    4776da05c78ba1b356b957c481de3df9_JaffaCakes118

  • Size

    837KB

  • Sample

    241015-m965hs1cne

  • MD5

    4776da05c78ba1b356b957c481de3df9

  • SHA1

    16b6634b431682895f07c4ff1d912ef844712aa9

  • SHA256

    37618200ca15f760f9eb09fcaa6a6e9f9591ea49c69d3db0a5e47af01913bb3c

  • SHA512

    e8f406488554317dec310d2554df0f0da57b192aaff86c1467bd8cdda37721cdc22eb3f7adf5d88fabd8fa1bd15a96c8706558410cb0e8c7cc60c96d404579c5

  • SSDEEP

    12288:0cvddSZzt2NjFmzPXHuXJ1+scrL7J3yCGXF+8g10nErLaKe3P1HZVD:0OddSZzMNj2QJ1YyCGXF+8e03P5ZV

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @Mexico1.,

Targets

    • Target

      4776da05c78ba1b356b957c481de3df9_JaffaCakes118

    • Size

      837KB

    • MD5

      4776da05c78ba1b356b957c481de3df9

    • SHA1

      16b6634b431682895f07c4ff1d912ef844712aa9

    • SHA256

      37618200ca15f760f9eb09fcaa6a6e9f9591ea49c69d3db0a5e47af01913bb3c

    • SHA512

      e8f406488554317dec310d2554df0f0da57b192aaff86c1467bd8cdda37721cdc22eb3f7adf5d88fabd8fa1bd15a96c8706558410cb0e8c7cc60c96d404579c5

    • SSDEEP

      12288:0cvddSZzt2NjFmzPXHuXJ1+scrL7J3yCGXF+8g10nErLaKe3P1HZVD:0OddSZzMNj2QJ1YyCGXF+8e03P5ZV

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks