General

  • Target

    072a4b9ea22d754157c9da924b4d1df7_JaffaCakes118

  • Size

    602KB

  • Sample

    240429-jnwj4sdg45

  • MD5

    072a4b9ea22d754157c9da924b4d1df7

  • SHA1

    672f4c8110cf11fb08060e77f5251d31995842cf

  • SHA256

    703a0db4266a693c62599cc58258bc2cf64ad02a1435c1d44a6d15fcc2b6fa39

  • SHA512

    ecfc397750a1c514346e3e6319dcc23d68e2c51c57508e306ac36cf3279a6490ffef2c5c4654c6d0b79cfd12876aede777f7e326e7b320ba89b8c44340079eef

  • SSDEEP

    12288:I6AjjimN6BScnSBaByTowftqmgDYddBe+tzBdR15:8cfBcf5hddBe+Z

Malware Config

Targets

    • Target

      072a4b9ea22d754157c9da924b4d1df7_JaffaCakes118

    • Size

      602KB

    • MD5

      072a4b9ea22d754157c9da924b4d1df7

    • SHA1

      672f4c8110cf11fb08060e77f5251d31995842cf

    • SHA256

      703a0db4266a693c62599cc58258bc2cf64ad02a1435c1d44a6d15fcc2b6fa39

    • SHA512

      ecfc397750a1c514346e3e6319dcc23d68e2c51c57508e306ac36cf3279a6490ffef2c5c4654c6d0b79cfd12876aede777f7e326e7b320ba89b8c44340079eef

    • SSDEEP

      12288:I6AjjimN6BScnSBaByTowftqmgDYddBe+tzBdR15:8cfBcf5hddBe+Z

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks