General

  • Target

    074d63cbd8c78f769bbd87e7490a2442_JaffaCakes118

  • Size

    226KB

  • Sample

    240429-k33seafc71

  • MD5

    074d63cbd8c78f769bbd87e7490a2442

  • SHA1

    acbeb64ad317da06be790c34bea251751bf77f87

  • SHA256

    5955f46583f4924d71111f2da328a70cd8992785d56c0452e8487522d0bff654

  • SHA512

    706eae611daa57ae8174848e1aecd487fa2daaa1d95c8d82aa325fa268d3e677f249bd332569b83f715b1646ca7ff4dff1c6c9af4efbb2281de68741da979fda

  • SSDEEP

    6144:ZUqvMbb4WnOol337QbU5xp8LqSRCjQEgmYLicfBQILqWsWL:aqvMX4S337QbUlSQkEfxAvL

Malware Config

Targets

    • Target

      Factura august.exe

    • Size

      702KB

    • MD5

      a7c001a554d70ce3d9c507f5dc96cec1

    • SHA1

      49fd5f79bf4b7114b944df71794c4f973a4bf3b5

    • SHA256

      810283414d0227a30fde6fd20593769cfc268a36981c0012b541be996a8c6836

    • SHA512

      f0487ff91282ce859a92b1e7c5aeed68c1ae02aa6b9e124be5e4dcd46588e4b1485d64e665cec0c1c54a72ec76417e17310372a76c4ddb5f94c798d3602d2bfa

    • SSDEEP

      6144:3Bz+EE7pnoxuHlzPUPUHogdOURe572Gq8jV5lAtHEseUOuu:3d4zdUPUHoYSq8J5IEseUOuu

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks