General

  • Target

    f42876cc27ddbbb71bc378df98f01b95_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240416-x2ck2sac96

  • MD5

    f42876cc27ddbbb71bc378df98f01b95

  • SHA1

    1ed8ad62bb7582580e17a7a312038653a81a5ba6

  • SHA256

    33cb15cd8cf01b88db2f79a3b06266c2684bfc6d308621de2eee366881125ef3

  • SHA512

    878e8de1a326fecbd34e4f4a4754d1ba7dfbdb3367ad1e7eb366eb4d066ffa5db86fc35234249505784b8b7c0e541a9122ed4a26510574372d911cdd8905a6b4

  • SSDEEP

    24576:do2A4dbP6LwtHwYgV0y57g4hWwyNtT/NJKaop:6by60tHwD2Fz1Nt5JKlp

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      f42876cc27ddbbb71bc378df98f01b95_JaffaCakes118

    • Size

      1.1MB

    • MD5

      f42876cc27ddbbb71bc378df98f01b95

    • SHA1

      1ed8ad62bb7582580e17a7a312038653a81a5ba6

    • SHA256

      33cb15cd8cf01b88db2f79a3b06266c2684bfc6d308621de2eee366881125ef3

    • SHA512

      878e8de1a326fecbd34e4f4a4754d1ba7dfbdb3367ad1e7eb366eb4d066ffa5db86fc35234249505784b8b7c0e541a9122ed4a26510574372d911cdd8905a6b4

    • SSDEEP

      24576:do2A4dbP6LwtHwYgV0y57g4hWwyNtT/NJKaop:6by60tHwD2Fz1Nt5JKlp

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks