General

  • Target

    fe3ed7479a5aa704361999175c03f5b0_JaffaCakes118

  • Size

    729KB

  • Sample

    240421-c7dp3shc3v

  • MD5

    fe3ed7479a5aa704361999175c03f5b0

  • SHA1

    a9b1c9c780e6a8bed0c2410c7280d4ac0aa8ea40

  • SHA256

    3f5c564604f35defce8860339fccfc62c63338ff8b1283473294b0f7fe9ac84e

  • SHA512

    b1489eb1c53c927b92653165ccc04b43baa4e44b7f71a6e2825fc3e3e0507b28d753ed7cad95ee14e6c8f157d8dc8176a0455198f71d3679837a91c439de0656

  • SSDEEP

    12288:ANICRHTzbM9yHLnXGSq2p9l4vi14v0Lzh5ckjxOgOsnxOUymHQ86sEqUJHawKTF:6EknXGuD4viE0L9aSxNOmxOUymwMG

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      fe3ed7479a5aa704361999175c03f5b0_JaffaCakes118

    • Size

      729KB

    • MD5

      fe3ed7479a5aa704361999175c03f5b0

    • SHA1

      a9b1c9c780e6a8bed0c2410c7280d4ac0aa8ea40

    • SHA256

      3f5c564604f35defce8860339fccfc62c63338ff8b1283473294b0f7fe9ac84e

    • SHA512

      b1489eb1c53c927b92653165ccc04b43baa4e44b7f71a6e2825fc3e3e0507b28d753ed7cad95ee14e6c8f157d8dc8176a0455198f71d3679837a91c439de0656

    • SSDEEP

      12288:ANICRHTzbM9yHLnXGSq2p9l4vi14v0Lzh5ckjxOgOsnxOUymHQ86sEqUJHawKTF:6EknXGuD4viE0L9aSxNOmxOUymwMG

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks