General

  • Target

    8a2a164482a0142728ab3bbd4559d686_JaffaCakes118

  • Size

    721KB

  • Sample

    240601-mdbnqshg6z

  • MD5

    8a2a164482a0142728ab3bbd4559d686

  • SHA1

    9db2bbe3fc8a10fd9b5a3c48c8e540c743a1c1f9

  • SHA256

    7693781ca53fb17f4639ca60041799d2efb919301109f65caa16a41e2f96c43a

  • SHA512

    aed8a6978aa3e263d59f2f1e6ba558b5bc238125cbfd602bfca79efd1350943dfceba3a6b9a4c14155a5b923d57009186a7a3f8896e1606bd6f9df3f39c9b4cd

  • SSDEEP

    12288:XcFUncJ54irus265GoqlDX1YH0COI+w7Ror6PpGg+l2K3RYUOsSeysBF4vf9uQ7j:dnYnuRcBIoGblBhP7hF+f9Zn

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kingdom12345

Targets

    • Target

      8a2a164482a0142728ab3bbd4559d686_JaffaCakes118

    • Size

      721KB

    • MD5

      8a2a164482a0142728ab3bbd4559d686

    • SHA1

      9db2bbe3fc8a10fd9b5a3c48c8e540c743a1c1f9

    • SHA256

      7693781ca53fb17f4639ca60041799d2efb919301109f65caa16a41e2f96c43a

    • SHA512

      aed8a6978aa3e263d59f2f1e6ba558b5bc238125cbfd602bfca79efd1350943dfceba3a6b9a4c14155a5b923d57009186a7a3f8896e1606bd6f9df3f39c9b4cd

    • SSDEEP

      12288:XcFUncJ54irus265GoqlDX1YH0COI+w7Ror6PpGg+l2K3RYUOsSeysBF4vf9uQ7j:dnYnuRcBIoGblBhP7hF+f9Zn

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks