General

  • Target

    5baf7601ec7eb5a300f100e290a7d153_JaffaCakes118

  • Size

    501KB

  • Sample

    240519-1ttfdaca8s

  • MD5

    5baf7601ec7eb5a300f100e290a7d153

  • SHA1

    b9f3a86ea1f05ceb1cd56aa9f2717080394685ab

  • SHA256

    b09df31ac193a42a150b38f437e20feedc150a673fc5107bf4326064e7621ce1

  • SHA512

    fdb74691bd59b3cf7a565f4ffcd27e49886fec56396c6c7a67d8e02f09272e13c72401fa8f55b989352eedf0175a3a832f19c75774efca4512b48915b31a96c7

  • SSDEEP

    6144:QhJZj3XBjlkq27zgxRQNC3C/HXheIRMaDcTEDQcZsXJt6zUG0+htWOEEFeF6G++P:IzZo7cvNqXwTIH0c66zUG0+WOjd+

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.dveshop.ro/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ;0E4xWb(lC*Z

  • Protocol:
    ftp
  • Host:
    ftp://ftp.dveshop.ro/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ;0E4xWb(lC*Z

Targets

    • Target

      5baf7601ec7eb5a300f100e290a7d153_JaffaCakes118

    • Size

      501KB

    • MD5

      5baf7601ec7eb5a300f100e290a7d153

    • SHA1

      b9f3a86ea1f05ceb1cd56aa9f2717080394685ab

    • SHA256

      b09df31ac193a42a150b38f437e20feedc150a673fc5107bf4326064e7621ce1

    • SHA512

      fdb74691bd59b3cf7a565f4ffcd27e49886fec56396c6c7a67d8e02f09272e13c72401fa8f55b989352eedf0175a3a832f19c75774efca4512b48915b31a96c7

    • SSDEEP

      6144:QhJZj3XBjlkq27zgxRQNC3C/HXheIRMaDcTEDQcZsXJt6zUG0+htWOEEFeF6G++P:IzZo7cvNqXwTIH0c66zUG0+WOjd+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks