General

  • Target

    JaffaCakes118_b621924e335655edaba9439ccea827eb

  • Size

    616KB

  • Sample

    250105-wxdf4s1rg1

  • MD5

    b621924e335655edaba9439ccea827eb

  • SHA1

    4e343bd91dcb00d97e3358e4f58c1abf8d7934ae

  • SHA256

    83e502e80155a84f00827157d2d240c84f98bba985ef20539badcdb89ec205ac

  • SHA512

    d0c9e387bce01f7d0f2f696eae611e5ce7e11a913c48fa4d7e91bb3d06cf314d45906d27c59265abab333b17a96fd154a47323c4f3e47d9cc0fff8f7fe291add

  • SSDEEP

    12288:XLdGaMeWx5baLOXiBGTxdxR69sb9VSBfQpFPENgNi8:XLw1gLOXjxd6yaBfUE6

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Mariodavid@89

Targets

    • Target

      JaffaCakes118_b621924e335655edaba9439ccea827eb

    • Size

      616KB

    • MD5

      b621924e335655edaba9439ccea827eb

    • SHA1

      4e343bd91dcb00d97e3358e4f58c1abf8d7934ae

    • SHA256

      83e502e80155a84f00827157d2d240c84f98bba985ef20539badcdb89ec205ac

    • SHA512

      d0c9e387bce01f7d0f2f696eae611e5ce7e11a913c48fa4d7e91bb3d06cf314d45906d27c59265abab333b17a96fd154a47323c4f3e47d9cc0fff8f7fe291add

    • SSDEEP

      12288:XLdGaMeWx5baLOXiBGTxdxR69sb9VSBfQpFPENgNi8:XLw1gLOXjxd6yaBfUE6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks