General

  • Target

    029ba195c7ee484f1d9e890cb53c3253_JaffaCakes118

  • Size

    280KB

  • Sample

    240427-gy8w3scg66

  • MD5

    029ba195c7ee484f1d9e890cb53c3253

  • SHA1

    0f70c95f5fbb79bd5706fa95c50f6396d4a5287f

  • SHA256

    9f831e9bfb119196a397daf7a20e88c1a4b6fedea30f480e790e1949053b01bf

  • SHA512

    6cc099fa017d5be11f90a5038deb05bc4df9e0347255264ecb74fdbcdb10b8d592eeefc9effadc84997fa3cf66f21537ce9ddf1208731846386ce0a75603a32b

  • SSDEEP

    3072:88B9eGRGf/lHy2xlP9xlISMxyNNjs5dfI85oBhmAjSuHauBFdCL+m7YniIHUlgi:88B8Ny2bP9xlIPFzfI85oTmAGuHlqCd

Malware Config

Targets

    • Target

      029ba195c7ee484f1d9e890cb53c3253_JaffaCakes118

    • Size

      280KB

    • MD5

      029ba195c7ee484f1d9e890cb53c3253

    • SHA1

      0f70c95f5fbb79bd5706fa95c50f6396d4a5287f

    • SHA256

      9f831e9bfb119196a397daf7a20e88c1a4b6fedea30f480e790e1949053b01bf

    • SHA512

      6cc099fa017d5be11f90a5038deb05bc4df9e0347255264ecb74fdbcdb10b8d592eeefc9effadc84997fa3cf66f21537ce9ddf1208731846386ce0a75603a32b

    • SSDEEP

      3072:88B9eGRGf/lHy2xlP9xlISMxyNNjs5dfI85oBhmAjSuHauBFdCL+m7YniIHUlgi:88B8Ny2bP9xlIPFzfI85oTmAGuHlqCd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Tasks