General

  • Target

    453d380df8c54661f8c8d06087c6e58b_JaffaCakes118

  • Size

    290KB

  • Sample

    240515-jy7ecsgc9v

  • MD5

    453d380df8c54661f8c8d06087c6e58b

  • SHA1

    90d3c46e95edb6f666f9b7514c978f0325f072d2

  • SHA256

    6d4ff3dbc899c8515472f0894da13b7841004052077c5e1370ce89c47254f7f9

  • SHA512

    7342efa1e90c7a9eb94f11e3a7d8b6de69bf740b2e0326d25b1ebc2839d7b6cb2b6f7a879707c5c07a0fbbe139ff2059236a858462e5756aeff027de1169b166

  • SSDEEP

    6144:VL86Mx+PDfWaB/uPfFBl185bC4oiklzKSEqzJObDoCTV:piUPDohnzaoCTV

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.miketony-tw.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    kqNbV!Y9

Targets

    • Target

      453d380df8c54661f8c8d06087c6e58b_JaffaCakes118

    • Size

      290KB

    • MD5

      453d380df8c54661f8c8d06087c6e58b

    • SHA1

      90d3c46e95edb6f666f9b7514c978f0325f072d2

    • SHA256

      6d4ff3dbc899c8515472f0894da13b7841004052077c5e1370ce89c47254f7f9

    • SHA512

      7342efa1e90c7a9eb94f11e3a7d8b6de69bf740b2e0326d25b1ebc2839d7b6cb2b6f7a879707c5c07a0fbbe139ff2059236a858462e5756aeff027de1169b166

    • SSDEEP

      6144:VL86Mx+PDfWaB/uPfFBl185bC4oiklzKSEqzJObDoCTV:piUPDohnzaoCTV

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks