General

  • Target

    6059af9f3c28feb5f6c11c59cd1608d3_JaffaCakes118

  • Size

    622KB

  • Sample

    240520-v7x3tsbe3x

  • MD5

    6059af9f3c28feb5f6c11c59cd1608d3

  • SHA1

    a415379ed18f8934b2f544fec689a5d376591ba1

  • SHA256

    1be8fddcc8dda5cb7140adcc72e629f73e33b8fdd73b12f7cff969835a60d8d8

  • SHA512

    23c7abe6e6296c82579610f9b513fcf30d1d29ae7f4636498fef5ae956f4c93150e0d6e90db003deb79f7debee550268630c084a03d0947af553ebf2fcc9a9ab

  • SSDEEP

    12288:v+l5os/UdkqS3gEQvC9eff4GzX1kg3TF50YCgQADxWM/WcVv0MRnVn:v+l5yaZQf4OXDT75DxW1MRnJ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PURCHASE ORDER.exe

    • Size

      736KB

    • MD5

      4040a8de40f0006800a533514935fc9e

    • SHA1

      22c34025f63c530e24771121fe66599d892884f7

    • SHA256

      fc97ff4201a640898a0378c099732689b17f53c54ec77b1016705e96cd8938a8

    • SHA512

      c7689555042a33f63acddc207003196afe4e798626d9ef04bfbe2fa8a51186b6a4ff540c5e4f875b5d1f3709e93e05a9bff5247372ccf9944584642f70bc9cc3

    • SSDEEP

      12288:9Wj52E/UdqaW3gKQRy9sfvKMRRjkW3bFNoeCgQY5xy2/+c9n0w1cauh:Ij5GMNCvKIRRbvv5xyNw1ca0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks