General

  • Target

    25187e1348ce3471f3ac3b620edb3a63_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240329-sc8vqsah9t

  • MD5

    25187e1348ce3471f3ac3b620edb3a63

  • SHA1

    2193f4d5aa0a9e00dbbb8bdf2d40176adb5070c6

  • SHA256

    dc6ec612a3647aa1c29469710570837f1bab7e1e5e0f3fd0f6dd0a261c4c331a

  • SHA512

    7ee5f366b82bda3275fef09f254fab380c2cfef6c545fac5667b54b54d767f5a33c2bb0cf7a0ba6e2296a6d3381645511734f8bfa193edcaa21f8d0e23ef22b2

  • SSDEEP

    24576:qK9f2qklIXUU+Jm5KK2VHuZ2VYJUEKlCW:jf4lIEPmsYJUEKlCW

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.vivaldi.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Password1000

Targets

    • Target

      25187e1348ce3471f3ac3b620edb3a63_JaffaCakes118

    • Size

      1.2MB

    • MD5

      25187e1348ce3471f3ac3b620edb3a63

    • SHA1

      2193f4d5aa0a9e00dbbb8bdf2d40176adb5070c6

    • SHA256

      dc6ec612a3647aa1c29469710570837f1bab7e1e5e0f3fd0f6dd0a261c4c331a

    • SHA512

      7ee5f366b82bda3275fef09f254fab380c2cfef6c545fac5667b54b54d767f5a33c2bb0cf7a0ba6e2296a6d3381645511734f8bfa193edcaa21f8d0e23ef22b2

    • SSDEEP

      24576:qK9f2qklIXUU+Jm5KK2VHuZ2VYJUEKlCW:jf4lIEPmsYJUEKlCW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks