General

  • Target

    13c300659a5ac464da6342c1a58fea3e_JaffaCakes118

  • Size

    366KB

  • Sample

    240329-aqsrkace6s

  • MD5

    13c300659a5ac464da6342c1a58fea3e

  • SHA1

    1d8a32e324ba6a74594162fa4f906c1ab5488c7a

  • SHA256

    f519a7adeec97db32f536e9868c000842db13a165080a6f85a6d990c8e45dfb6

  • SHA512

    55b1c4261310b8f9700016a0aa43b3a4b0e92278f264cf7afcc4ce45c222e1b9dd991a70c30904f4f3cc2f07f0f03f2b40c2b3914231e7cb2dcf061e52ca4727

  • SSDEEP

    6144:MwHibQ+MkhBWTNGkGTRd8wFtzdwYEU4x53CCr0kYGbWJfXhUSAxm18yvVuLsBT:MsSBWAkGVdD7bqxYCAb20L

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.romanservices.ca/
  • Port:
    21
  • Username:
    cleaner@romanservices.ca
  • Password:
    Kakata2928@

Targets

    • Target

      13c300659a5ac464da6342c1a58fea3e_JaffaCakes118

    • Size

      366KB

    • MD5

      13c300659a5ac464da6342c1a58fea3e

    • SHA1

      1d8a32e324ba6a74594162fa4f906c1ab5488c7a

    • SHA256

      f519a7adeec97db32f536e9868c000842db13a165080a6f85a6d990c8e45dfb6

    • SHA512

      55b1c4261310b8f9700016a0aa43b3a4b0e92278f264cf7afcc4ce45c222e1b9dd991a70c30904f4f3cc2f07f0f03f2b40c2b3914231e7cb2dcf061e52ca4727

    • SSDEEP

      6144:MwHibQ+MkhBWTNGkGTRd8wFtzdwYEU4x53CCr0kYGbWJfXhUSAxm18yvVuLsBT:MsSBWAkGVdD7bqxYCAb20L

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Tasks