General

  • Target

    f9d3af1a81035873e81120aac8b46ef9_JaffaCakes118

  • Size

    281KB

  • Sample

    240927-ge5qbaxfqm

  • MD5

    f9d3af1a81035873e81120aac8b46ef9

  • SHA1

    e6ee6cb40560ec9c620b7c6f7f8a05167938feec

  • SHA256

    54233835456c520d8b773883f829f3f171028c2dd1aaf12925de3d55db21e93c

  • SHA512

    42ddac8949291d8554f6d677d3c6999a63fd0c79f16e34ad52fc995a2ccbd32f5760d14eddb32043f3f55a80baa815c93b52eb4ad6ffe50e203770bfb9796a11

  • SSDEEP

    6144:u638jItU/D83n5vVWWpU6XxIaxQwa8btVmbZ:N38jIED8Zzps8

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gkenrterprise.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    #irNYOS4

Targets

    • Target

      f9d3af1a81035873e81120aac8b46ef9_JaffaCakes118

    • Size

      281KB

    • MD5

      f9d3af1a81035873e81120aac8b46ef9

    • SHA1

      e6ee6cb40560ec9c620b7c6f7f8a05167938feec

    • SHA256

      54233835456c520d8b773883f829f3f171028c2dd1aaf12925de3d55db21e93c

    • SHA512

      42ddac8949291d8554f6d677d3c6999a63fd0c79f16e34ad52fc995a2ccbd32f5760d14eddb32043f3f55a80baa815c93b52eb4ad6ffe50e203770bfb9796a11

    • SSDEEP

      6144:u638jItU/D83n5vVWWpU6XxIaxQwa8btVmbZ:N38jIED8Zzps8

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks