General

  • Target

    JaffaCakes118_9823f7e948183b00c21118b449928b13

  • Size

    402KB

  • Sample

    250105-kjg2la1lcr

  • MD5

    9823f7e948183b00c21118b449928b13

  • SHA1

    3cc0a60deb05754df077d61cfd3686dbf22aaae7

  • SHA256

    cd778d0104c736ba30345dd9563b44ef91af6e67e220c82bce341148fd3a486a

  • SHA512

    3bcb625f108ecedc29bd87bbcced8ebae8c6ba5e54ef14cfd0756b4f161e09aa03dcf2c17f460c8165889b9dcc9bba23ae497494c21122b56498abc9455df5be

  • SSDEEP

    6144:kTIsqMJytt5RxiGMByZk1YjSn1bojcLv8DIW6myoN3+K2DGH8LA5AsXnY:8ZqMoYmj8bosnBmv+ZZLmAso

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1842959733:AAFY3p5rwdG6JV0Y6_CQjuDBIdfxG4yDKKA/sendDocument

Targets

    • Target

      JaffaCakes118_9823f7e948183b00c21118b449928b13

    • Size

      402KB

    • MD5

      9823f7e948183b00c21118b449928b13

    • SHA1

      3cc0a60deb05754df077d61cfd3686dbf22aaae7

    • SHA256

      cd778d0104c736ba30345dd9563b44ef91af6e67e220c82bce341148fd3a486a

    • SHA512

      3bcb625f108ecedc29bd87bbcced8ebae8c6ba5e54ef14cfd0756b4f161e09aa03dcf2c17f460c8165889b9dcc9bba23ae497494c21122b56498abc9455df5be

    • SSDEEP

      6144:kTIsqMJytt5RxiGMByZk1YjSn1bojcLv8DIW6myoN3+K2DGH8LA5AsXnY:8ZqMoYmj8bosnBmv+ZZLmAso

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks