General

  • Target

    JaffaCakes118_43d51713fd393de6a97793c342d51b9b

  • Size

    482KB

  • Sample

    250107-a4r27awlfv

  • MD5

    43d51713fd393de6a97793c342d51b9b

  • SHA1

    483cda88bfea3555de80f01d72aa4d52c4c6bdcf

  • SHA256

    791c27879e42834fdb2537f9e0be908112a74429f7a3b7ac62e8735a3b764951

  • SHA512

    c5d5e86d074caf9a440cabddc6bc5f839b35c0fad62ce8dc382d43d96f9208cbcc7a94b918bb6c314606ff3fe286575a611460401f4367f9c3f3cdd3b1491d32

  • SSDEEP

    12288:wuGIRivaKUsVnXch22zOhmY3lvVU7JtIq:E+yXcv6kZ7JtIq

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.penavico--cz.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Fq$L%J((!6

Targets

    • Target

      JaffaCakes118_43d51713fd393de6a97793c342d51b9b

    • Size

      482KB

    • MD5

      43d51713fd393de6a97793c342d51b9b

    • SHA1

      483cda88bfea3555de80f01d72aa4d52c4c6bdcf

    • SHA256

      791c27879e42834fdb2537f9e0be908112a74429f7a3b7ac62e8735a3b764951

    • SHA512

      c5d5e86d074caf9a440cabddc6bc5f839b35c0fad62ce8dc382d43d96f9208cbcc7a94b918bb6c314606ff3fe286575a611460401f4367f9c3f3cdd3b1491d32

    • SSDEEP

      12288:wuGIRivaKUsVnXch22zOhmY3lvVU7JtIq:E+yXcv6kZ7JtIq

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks