General

  • Target

    a6aeff5b872702a8554063d812d895d6_JaffaCakes118

  • Size

    775KB

  • Sample

    240613-1gmgasvdkq

  • MD5

    a6aeff5b872702a8554063d812d895d6

  • SHA1

    199f01a82c144f6a38642d931c03a351c4733e24

  • SHA256

    1989282029a61e17edbca3c6f997a1119ac28e999b9ecf53d84655a04c9a72c6

  • SHA512

    cd74c96ebe9056f1fcb43c7537e8e4b205b400e6919f5faf349785a0f2f5e4fa0c5087ae6f3e5a4914ecfc6dbd3e0067dbc7a515ee3c6ebce675cd6eb0e19a18

  • SSDEEP

    24576:4ExvMiLY6PBUDu8TaIabfbFtZGVLyfEN0caH4:4ExvMiLY6P/4QIVXNqH4

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    k4mp1ng3254061

Targets

    • Target

      a6aeff5b872702a8554063d812d895d6_JaffaCakes118

    • Size

      775KB

    • MD5

      a6aeff5b872702a8554063d812d895d6

    • SHA1

      199f01a82c144f6a38642d931c03a351c4733e24

    • SHA256

      1989282029a61e17edbca3c6f997a1119ac28e999b9ecf53d84655a04c9a72c6

    • SHA512

      cd74c96ebe9056f1fcb43c7537e8e4b205b400e6919f5faf349785a0f2f5e4fa0c5087ae6f3e5a4914ecfc6dbd3e0067dbc7a515ee3c6ebce675cd6eb0e19a18

    • SSDEEP

      24576:4ExvMiLY6PBUDu8TaIabfbFtZGVLyfEN0caH4:4ExvMiLY6P/4QIVXNqH4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks