General

  • Target

    ef23576ed90e4d18cd3a63bb25a61cd6_JaffaCakes118

  • Size

    493KB

  • Sample

    240921-f1fsmsxajk

  • MD5

    ef23576ed90e4d18cd3a63bb25a61cd6

  • SHA1

    fed2b51488c9991b815d2a23bcd53ccbc1bce8b5

  • SHA256

    cd0bc188c3dc9db6dfe172f741057a0b125fc5929c918e5bf6da9db4f25a5965

  • SHA512

    a3ed94b810c097d8420c652e4a95df3c47e306b8a7d8b09a30b3925936fe0e985a4262bfabd4c2b4ff7d3b0509ad23643722f07cac880d69d9a90ec930591e58

  • SSDEEP

    12288:Sti1Prit+ApkT0CZKE+9W/Y32pAIao3xooe/T8iMSpN:HqPk4CAWo2pl332oe/QiMSpN

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Blessed000@

Targets

    • Target

      payment_copy.exe

    • Size

      875KB

    • MD5

      ac1a8206adb3d237cde83fc94bd94a9e

    • SHA1

      70fe09146431ece56856dd12edf21dfb16f0e07d

    • SHA256

      d0a5879ca1972047afbdf730b2ef1c09b6b74e93b35d6e1afe68d50261e0c771

    • SHA512

      d646d1501c8dfb4389af429905334b3ded96462f4637de5db438a6d4aee8290d4a7ffa49e8acf0f71e209106921743588129adc59aabcbd9fecc731f3af1998b

    • SSDEEP

      12288:TqA8+g17rix6knkTSCZKY+fW/a3IpAmaE7xMo6gKoAmQ7M:yEDkOCCWyIpB572o6D7M

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks