General

  • Target

    5131cdfe8f6e09ec19fcb864f655add8_JaffaCakes118

  • Size

    673KB

  • Sample

    240517-yjczjafh74

  • MD5

    5131cdfe8f6e09ec19fcb864f655add8

  • SHA1

    6381376db2cc0fc6ab2fda54a37753718d4804c1

  • SHA256

    40d6a169fdb6d664157c9850182f19d0c066b7debe373a7ca7298d47bcf9c7a3

  • SHA512

    f44cc62148df0a8cbc44138f1452fc782cfa952e5dfa5f56765d23b57dffcb3f8667c5cfa18aba0408d78405120c297c729427741d0620cca9d7c0a139e37dfd

  • SSDEEP

    6144:OK3QQW6I1XWThfuDYGSZXOye4zq+RmBj2h0rnsnkikv4B:OMQNY9GSZXO4zqym9fikwB

Malware Config

Targets

    • Target

      5131cdfe8f6e09ec19fcb864f655add8_JaffaCakes118

    • Size

      673KB

    • MD5

      5131cdfe8f6e09ec19fcb864f655add8

    • SHA1

      6381376db2cc0fc6ab2fda54a37753718d4804c1

    • SHA256

      40d6a169fdb6d664157c9850182f19d0c066b7debe373a7ca7298d47bcf9c7a3

    • SHA512

      f44cc62148df0a8cbc44138f1452fc782cfa952e5dfa5f56765d23b57dffcb3f8667c5cfa18aba0408d78405120c297c729427741d0620cca9d7c0a139e37dfd

    • SSDEEP

      6144:OK3QQW6I1XWThfuDYGSZXOye4zq+RmBj2h0rnsnkikv4B:OMQNY9GSZXO4zqym9fikwB

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks