General

  • Target

    e31fe90aae5b910dfff40ede572d1273_JaffaCakes118

  • Size

    291KB

  • Sample

    240915-w4hpeawgqg

  • MD5

    e31fe90aae5b910dfff40ede572d1273

  • SHA1

    caccc20a25fe5b9f510110b814493ae63b0a296a

  • SHA256

    b45055a1888512ef8398263c0b74086b759048e9ab186a36c765583bfc1e952b

  • SHA512

    8c2ec99b36ed592765d796f7174c142eaa31d75b3ad9fd0efe166d09432b2ef2f4e79bb4c0dcdccffb253ce1fa3079c27f96996421957246802582adbf7b1c7b

  • SSDEEP

    6144:VMk5sYCR8rC8/5u3AgNYzbbGQ4ZPW2EwrPZAQo3amBAC3W9kMWHuT:lttrCIoNq3T4Y2EEeQoKmpMWOT

Malware Config

Targets

    • Target

      Request for Quote - 6000412697.exe

    • Size

      680KB

    • MD5

      dd20d2512dd9dbfc2dbed9563c6ea1d4

    • SHA1

      7f6a2ee121e006a7bf049c1e63b51c0978e46947

    • SHA256

      732bae130c34155713bda6f16636b2063e5e8e35864d0352b2f3f343fab645cb

    • SHA512

      35bab27fb74ae1f1e5b996b4e0eb0986d7a626511c23ab394532d2a9d56d2472e7a2dbc9abcc965fc1f0e34d56992cc6c0cb303f3f9072ad4286eb2d7e20be0f

    • SSDEEP

      6144:ENg5JHngPhIJeFA2eFAkhIk6mbYiAr5gmQ8b3LNMK5vfAqRXjb0roFBVLnWFby3s:EQJg0z2z0YiQRQ8qUnjcoFBVLWF2/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks