General

  • Target

    ec546e1a4d7f40aeb07bb8ca59b5e2d6_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240919-2n7aqavgmj

  • MD5

    ec546e1a4d7f40aeb07bb8ca59b5e2d6

  • SHA1

    2d6620d65e0947fdafa0b14cc67341fcfa836950

  • SHA256

    a98363bdb8463df20c4d516540582eef30b77dac637132c137511845de89f533

  • SHA512

    88623a66c57bbbb244d0ebefec1607cf60a065ac62a69903191caff1c9ec68d68ddc0c6eba80b41db4c1ebed1d9f0ecbc788c8b585c602411bf750c92e3b4337

  • SSDEEP

    24576:4AHnh+eWsN3skA4RV1Hom2KXMmHaT9HDzhBPeXDdq8Ba5:/h+ZkldoPK8YaTD8e

Malware Config

Targets

    • Target

      ec546e1a4d7f40aeb07bb8ca59b5e2d6_JaffaCakes118

    • Size

      1.4MB

    • MD5

      ec546e1a4d7f40aeb07bb8ca59b5e2d6

    • SHA1

      2d6620d65e0947fdafa0b14cc67341fcfa836950

    • SHA256

      a98363bdb8463df20c4d516540582eef30b77dac637132c137511845de89f533

    • SHA512

      88623a66c57bbbb244d0ebefec1607cf60a065ac62a69903191caff1c9ec68d68ddc0c6eba80b41db4c1ebed1d9f0ecbc788c8b585c602411bf750c92e3b4337

    • SSDEEP

      24576:4AHnh+eWsN3skA4RV1Hom2KXMmHaT9HDzhBPeXDdq8Ba5:/h+ZkldoPK8YaTD8e

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks