General

  • Target

    f6f9175c0b08ae364a95128d29d00e2c_JaffaCakes118

  • Size

    411KB

  • Sample

    240925-2ayres1cqr

  • MD5

    f6f9175c0b08ae364a95128d29d00e2c

  • SHA1

    93b0715701aa58ffcbde40c5e5415af225042351

  • SHA256

    2eb3807956289bb22b4a54c110ccc0587090fb814148048d80aa677c8e5b2eff

  • SHA512

    59ceaa542f3a223d068c86646dfa59c9720770b118e6f909df7da706362749e7f6c0c449f98cf76bd7daf6b0d087d6cdb589d0bac4629cf294d68d5a9508bc8d

  • SSDEEP

    12288:w2TQxNGVlUONiv3ERSkfJ1D5NlDTg64rtF4:ww9NA3dkxLTgBpy

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    HEoxefZ9

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    HEoxefZ9

Targets

    • Target

      PO pdf.exe

    • Size

      484KB

    • MD5

      b7f4df3e04498c6780f4dbc7966073f2

    • SHA1

      cd4ad36c710df4ffceb7c2b5ebbe51507627a553

    • SHA256

      70060de8a075dcc073a6200ba60fb8be1102112a92c7894dfa0edf6507553e58

    • SHA512

      f45313d600695b4e3d38dbf46bef74953f894255e26a8e341ddf77f2038778aac97d9c566f58a51dd3916e5116d7e34b4da1ff424dc731e7f7f963c52ecf30e8

    • SSDEEP

      12288:dT4mEZOzA3G7lmONQv3QRSkzJ1n5Nl9Tga4rtVX:dTOZOXJNS3pkldTghpZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks