General

  • Target

    c8c5d0aabc52a56a208a68d1b9160db0_JaffaCakes118

  • Size

    677KB

  • Sample

    240829-n3s5razera

  • MD5

    c8c5d0aabc52a56a208a68d1b9160db0

  • SHA1

    0756cd92c2302db55bae81b09af8cb98c4500427

  • SHA256

    960bf67766ef78ee40332e6f7fd22445702d3c7e493ca7f2aa6a3dfc48be6f9d

  • SHA512

    e75ee84c496275388b48860d97d4924526db89e65ba753ac46f929d06b65a821255e35252ba3c943fb3ec72c6c0ee0a9e7e948d6845db172fe890ae6c38c172b

  • SSDEEP

    12288:H1eRRAfxCIUnyNOI/SN/HWQZUpdycXHor8stg3JnB:ViRO8nyNOI0u7BXX

Malware Config

Targets

    • Target

      c8c5d0aabc52a56a208a68d1b9160db0_JaffaCakes118

    • Size

      677KB

    • MD5

      c8c5d0aabc52a56a208a68d1b9160db0

    • SHA1

      0756cd92c2302db55bae81b09af8cb98c4500427

    • SHA256

      960bf67766ef78ee40332e6f7fd22445702d3c7e493ca7f2aa6a3dfc48be6f9d

    • SHA512

      e75ee84c496275388b48860d97d4924526db89e65ba753ac46f929d06b65a821255e35252ba3c943fb3ec72c6c0ee0a9e7e948d6845db172fe890ae6c38c172b

    • SSDEEP

      12288:H1eRRAfxCIUnyNOI/SN/HWQZUpdycXHor8stg3JnB:ViRO8nyNOI0u7BXX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks