General

  • Target

    63b7fe6ad2c3dd2b1a0b829cf076c6ac_JaffaCakes118

  • Size

    461KB

  • Sample

    240521-sfeq3aaa4t

  • MD5

    63b7fe6ad2c3dd2b1a0b829cf076c6ac

  • SHA1

    442c48fe65b3563f904bcbda9933d6feda8d18cd

  • SHA256

    51cccbc60b6eee19aca1e805a04a850732145da33d59a441b947028f57701b5e

  • SHA512

    518de95de9d4f0cf28dada0c4f90786a1c3b4c7aa0614c41d5ee10d00e03ac55c5e8c8d3a88c0c042fce5009e2eb468c93bc3ead7cd1537ec5ee3e42405d2718

  • SSDEEP

    6144:AohBJVz3dA9XdWJcL7ukPCl1RfbmObGAfgDVyb+ZERa6ZVGfpLJRkf3jI1sUu3g/:3jEbMRfbmObrYkb+ZqvWxJufT4sC5j

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.intelligentprotection.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ^RBH}Ta%za[I

Targets

    • Target

      Statement of Account - July.exe

    • Size

      857KB

    • MD5

      f04786f6bf7b434b223f91ab199ecd9f

    • SHA1

      8b3a7044bd44625d89b13bc56aa4d3e0e55c3ff8

    • SHA256

      0cac72041657fe3141601ffafa5410b13128aec0f6e8cceb23fe7c7cb676d12e

    • SHA512

      e088d4b0bef96b19606078c8e1dc685e91ff801ca97c2e64eb7b044e4430ef25019150599ef749e4961e899fdf7e347d4ebf1e22659343b31063b58b7b4315a9

    • SSDEEP

      12288:FHlYcrKanXHzeEjMx6p4ddVvjUip3GKfm8LonhSumQE4VAzdNEOugUgDxgcF25Jt:FF7OuHzkK4d7403c8UnpedN/xkcdW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops startup file

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Tasks