General

  • Target

    02bfd695ecea2b103511e4bc6778a003_JaffaCakes118

  • Size

    279KB

  • Sample

    240427-jkx9jaeb42

  • MD5

    02bfd695ecea2b103511e4bc6778a003

  • SHA1

    8e32e873af163ceb1c0736e06645498115e3dec3

  • SHA256

    6aeacdc72ad78c30cb2b4f3108966a40b51e8059569730afebeece8e7714ae10

  • SHA512

    187c4f7786c036c3f254d6e445d703dfe125621ad20199fb909e2802af4497ed88f1bf06ef2968cdd2feb0964beee76b692167931ee8a349f041fc890130a877

  • SSDEEP

    6144:V0JbGMLl8sKzy3naTVBtGXPzNld/gIpTCtrBuVUXibY:EiZsQVBoXPHlZc

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    KduNSeP7

Targets

    • Target

      02bfd695ecea2b103511e4bc6778a003_JaffaCakes118

    • Size

      279KB

    • MD5

      02bfd695ecea2b103511e4bc6778a003

    • SHA1

      8e32e873af163ceb1c0736e06645498115e3dec3

    • SHA256

      6aeacdc72ad78c30cb2b4f3108966a40b51e8059569730afebeece8e7714ae10

    • SHA512

      187c4f7786c036c3f254d6e445d703dfe125621ad20199fb909e2802af4497ed88f1bf06ef2968cdd2feb0964beee76b692167931ee8a349f041fc890130a877

    • SSDEEP

      6144:V0JbGMLl8sKzy3naTVBtGXPzNld/gIpTCtrBuVUXibY:EiZsQVBoXPHlZc

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks