General

  • Target

    6819eadd12e77518f0d8078554df6f14_JaffaCakes118

  • Size

    299KB

  • Sample

    240522-wfw7wsba46

  • MD5

    6819eadd12e77518f0d8078554df6f14

  • SHA1

    2e63fb45558277f83ecece32b46b746e385c98d3

  • SHA256

    0730e55c2d263b232b7b78f3200ce292a91a42743d98ac5ea8bcee37cafcb3d1

  • SHA512

    1d82ed0d6cfa7dcf33d0b1f26cc09db259869ddc013ab023176f6ecc141acf26509c22b58e93900afc99cceeff0b3f657c00af8042e749615622b29d7e45f375

  • SSDEEP

    6144:ZZkBZBVgAs8z/CHrxC6XGCiKzFWMJgsDgZxz9t6TTATYhOb:bAfVd6XGCiKzveDSTz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.borovge.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    TbEUuQ^an2

Targets

    • Target

      6819eadd12e77518f0d8078554df6f14_JaffaCakes118

    • Size

      299KB

    • MD5

      6819eadd12e77518f0d8078554df6f14

    • SHA1

      2e63fb45558277f83ecece32b46b746e385c98d3

    • SHA256

      0730e55c2d263b232b7b78f3200ce292a91a42743d98ac5ea8bcee37cafcb3d1

    • SHA512

      1d82ed0d6cfa7dcf33d0b1f26cc09db259869ddc013ab023176f6ecc141acf26509c22b58e93900afc99cceeff0b3f657c00af8042e749615622b29d7e45f375

    • SSDEEP

      6144:ZZkBZBVgAs8z/CHrxC6XGCiKzFWMJgsDgZxz9t6TTATYhOb:bAfVd6XGCiKzveDSTz

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks