General

  • Target

    b79c2962f6d33ecfc5960ef0c16721b9_JaffaCakes118

  • Size

    576KB

  • Sample

    240617-j7t6dswdlm

  • MD5

    b79c2962f6d33ecfc5960ef0c16721b9

  • SHA1

    cfbf68a0a362e40b6af7bbaaec9bd2ea42df34b3

  • SHA256

    17a38ca3340b3edb5c7fc9f2166e14b10e4d6ee785fc850152c8faba449af480

  • SHA512

    0b71e2127c02f001c50b3df0393408a9d0d285850c0622ea0e881101d59a17f445544bb743de271e40282457dff754d298c4192259ed76b9d0986da539b935c5

  • SSDEEP

    12288:QEUXlPH1EecQYusd956Zv7mJ58/8xJqUin+AAWy8i1Zhq/:QEUVvmosd956ZqP8ExJqXAQi1

Malware Config

Targets

    • Target

      b79c2962f6d33ecfc5960ef0c16721b9_JaffaCakes118

    • Size

      576KB

    • MD5

      b79c2962f6d33ecfc5960ef0c16721b9

    • SHA1

      cfbf68a0a362e40b6af7bbaaec9bd2ea42df34b3

    • SHA256

      17a38ca3340b3edb5c7fc9f2166e14b10e4d6ee785fc850152c8faba449af480

    • SHA512

      0b71e2127c02f001c50b3df0393408a9d0d285850c0622ea0e881101d59a17f445544bb743de271e40282457dff754d298c4192259ed76b9d0986da539b935c5

    • SSDEEP

      12288:QEUXlPH1EecQYusd956Zv7mJ58/8xJqUin+AAWy8i1Zhq/:QEUVvmosd956ZqP8ExJqXAQi1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks