General

  • Target

    78239abe859d450a77030e78ee3b96e6_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240527-grfa7abc68

  • MD5

    78239abe859d450a77030e78ee3b96e6

  • SHA1

    cd2386e1aa561c541a24c8a2cac07fd7ffb58c81

  • SHA256

    79f647804ab897989d5eedddb7b9dc22ceee08353bd81d6132c72917e6ee2b1a

  • SHA512

    406455c6209ed34702e1ed3a0d822c14d92689a083bce8eb359c6de3736a72cad2d438dfde61112a81537d361d02843f33125b0a1a3c43b1c99bb723a329fd25

  • SSDEEP

    49152:1Vg5tQ7aVeudjcAEer3j6AvPMN6nJkCHl7Q5:7g56KdYAWAsN6nbZ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    HOFUF@5969

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    HOFUF@5969

Targets

    • Target

      78239abe859d450a77030e78ee3b96e6_JaffaCakes118

    • Size

      1.9MB

    • MD5

      78239abe859d450a77030e78ee3b96e6

    • SHA1

      cd2386e1aa561c541a24c8a2cac07fd7ffb58c81

    • SHA256

      79f647804ab897989d5eedddb7b9dc22ceee08353bd81d6132c72917e6ee2b1a

    • SHA512

      406455c6209ed34702e1ed3a0d822c14d92689a083bce8eb359c6de3736a72cad2d438dfde61112a81537d361d02843f33125b0a1a3c43b1c99bb723a329fd25

    • SSDEEP

      49152:1Vg5tQ7aVeudjcAEer3j6AvPMN6nJkCHl7Q5:7g56KdYAWAsN6nbZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Tasks