General

  • Target

    a1b019d4fae8f5f9728e78151a8ed69f_JaffaCakes118

  • Size

    354KB

  • Sample

    240612-wvg2hsvcjd

  • MD5

    a1b019d4fae8f5f9728e78151a8ed69f

  • SHA1

    1ba5ebd26b62ec8abc846fe67b812493862978ed

  • SHA256

    1366510b06b23b46e8de8bb22e63cc6052bed981f3b41aecc23fb8e6c654734e

  • SHA512

    22f47ec8b77279b8aa9802cde893aa1a8524d8fe6fff38d0252401ed5ef71abac82cdf0e6e119bc89ab32955e0af8ba2b6fe4b844e02d18eb0289fa645f41b5b

  • SSDEEP

    6144:dvB9U/NhUTtwQmh1+cOPfezP2tSTcRmpbT5DExuKu3yP7ooLMM:dZ9U/NMKf+cGoTcRcbTFEwVyp

Malware Config

Targets

    • Target

      a1b019d4fae8f5f9728e78151a8ed69f_JaffaCakes118

    • Size

      354KB

    • MD5

      a1b019d4fae8f5f9728e78151a8ed69f

    • SHA1

      1ba5ebd26b62ec8abc846fe67b812493862978ed

    • SHA256

      1366510b06b23b46e8de8bb22e63cc6052bed981f3b41aecc23fb8e6c654734e

    • SHA512

      22f47ec8b77279b8aa9802cde893aa1a8524d8fe6fff38d0252401ed5ef71abac82cdf0e6e119bc89ab32955e0af8ba2b6fe4b844e02d18eb0289fa645f41b5b

    • SSDEEP

      6144:dvB9U/NhUTtwQmh1+cOPfezP2tSTcRmpbT5DExuKu3yP7ooLMM:dZ9U/NMKf+cGoTcRcbTFEwVyp

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks