General

  • Target

    e348534c552b7f62c06bcdc18f6a460a_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240915-ymzbya1ckq

  • MD5

    e348534c552b7f62c06bcdc18f6a460a

  • SHA1

    58dc67566ee241a04a103903d2f59704ef4c69f9

  • SHA256

    58c04e08b3b2d8400cc0bd6f33e7b751f3456067582cd9c9bbd46d713df0f021

  • SHA512

    7a98db1b162fef5d941cc7096a47fdc3ffadeb191430c6773b29dbb7a713d9f6aa569e820567212cb3e2cbc1d63ef44a948274dff7b56be9cba3ba39002c3838

  • SSDEEP

    24576:aY2Mq0InVv0/okLimRxnMeTC/N9BK3ah5EB:dInp0QkRMUCjBKqh5E

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.studlandstol.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    dutyfaithlu12345

Targets

    • Target

      WDA5E033WcPm74M.exe

    • Size

      637KB

    • MD5

      2062da3e478d73b1fc79302c3e903cfb

    • SHA1

      cc5ef564edb3b8b81451123eaebf5d5fa24d9320

    • SHA256

      ec66bb08e7be3e235c199b1f253e949fc4296b105b7046cca10ae732cf347873

    • SHA512

      81b084f492c0cf2bdc775bbe90a9cc8226163bdc738f144843b424eaf8534983f4709091eb58f41c32a820613a9b84e2b13de23d8f0408182e4e08e1bb69f31f

    • SSDEEP

      12288:oY2MqxYxluS4n/WW5KyBp5Cr7LNSklZh48fR2WO+nTweTq5iIFr9BK3ah5EB:oY2Mq0InVv0/okLimRxnMeTC/N9BK3ao

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks