General

  • Target

    44dbc0b4c82ab5027ca0beee6bef5b3f_JaffaCakes118

  • Size

    603KB

  • Sample

    240714-h8391s1erl

  • MD5

    44dbc0b4c82ab5027ca0beee6bef5b3f

  • SHA1

    ae27a4a72c904bf4df7946cf065bb4d8cf8e2694

  • SHA256

    3f5bd96c293cb80ca6662ac5a385449403adc86fdc4bb55571637385fc2842cb

  • SHA512

    accf228f6a127d652568ed811db032cdb6993f0435b284f2927b867481f126b38fd823591446dd3e5d7bd8c31bd31bd67b9834eb867408df37d9d050c7b759db

  • SSDEEP

    12288:TEqbotmUgMi6FJm65fiA5uxL2AyO8c+kJT6YashlM0JT6YashlM:wssmURTF9fydxl9ashlV9ashl

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.citechco.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Webana@321#

Targets

    • Target

      44dbc0b4c82ab5027ca0beee6bef5b3f_JaffaCakes118

    • Size

      603KB

    • MD5

      44dbc0b4c82ab5027ca0beee6bef5b3f

    • SHA1

      ae27a4a72c904bf4df7946cf065bb4d8cf8e2694

    • SHA256

      3f5bd96c293cb80ca6662ac5a385449403adc86fdc4bb55571637385fc2842cb

    • SHA512

      accf228f6a127d652568ed811db032cdb6993f0435b284f2927b867481f126b38fd823591446dd3e5d7bd8c31bd31bd67b9834eb867408df37d9d050c7b759db

    • SSDEEP

      12288:TEqbotmUgMi6FJm65fiA5uxL2AyO8c+kJT6YashlM0JT6YashlM:wssmURTF9fydxl9ashlV9ashl

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks