General

  • Target

    025e389f56f9f161aba410efb3852d69_JaffaCakes118

  • Size

    687KB

  • Sample

    240930-vg9nyazdmd

  • MD5

    025e389f56f9f161aba410efb3852d69

  • SHA1

    0716c75a34c59f18d9e03a6af32bd14f6eb61351

  • SHA256

    048018a914effd76b034cfab6722e2c8a341fad9955faa95ef39ab4622900906

  • SHA512

    b7a8330aa31b69eb680c1dd55ed70db9ea1b0abdf62d8576254092e7d6c5ef648572669e92e81d75ee2b05343dcd28c0e3c2c63e35cfae7be7c380cc51846edb

  • SSDEEP

    12288:c5i/HK7z4cMlBFDv1bnQYWot4kr/kV9A0d4/xgH8nlMDZFP5:uUJ9bQYk2kE0GxI8un5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.northsrockusa.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (P%T2swlhOf}

Targets

    • Target

      025e389f56f9f161aba410efb3852d69_JaffaCakes118

    • Size

      687KB

    • MD5

      025e389f56f9f161aba410efb3852d69

    • SHA1

      0716c75a34c59f18d9e03a6af32bd14f6eb61351

    • SHA256

      048018a914effd76b034cfab6722e2c8a341fad9955faa95ef39ab4622900906

    • SHA512

      b7a8330aa31b69eb680c1dd55ed70db9ea1b0abdf62d8576254092e7d6c5ef648572669e92e81d75ee2b05343dcd28c0e3c2c63e35cfae7be7c380cc51846edb

    • SSDEEP

      12288:c5i/HK7z4cMlBFDv1bnQYWot4kr/kV9A0d4/xgH8nlMDZFP5:uUJ9bQYk2kE0GxI8un5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks