General

  • Target

    29a8f786bc0ecf80d7bafa4217e1a224_JaffaCakes118

  • Size

    610KB

  • Sample

    241009-djs1jaxhnr

  • MD5

    29a8f786bc0ecf80d7bafa4217e1a224

  • SHA1

    6bca0dc144af01ce39158cccb1a1f2e24591c690

  • SHA256

    5410997bdd858dbc071239783ae1dbe6966fcde498dbdfaccd08999637d5ed6c

  • SHA512

    cd3ec7a99e0d96f9240091106d85a4f42120483395a7a46e71432a527144953038766a7a2898fbbda36faef3f69f1eb10c6191bad7ff93b7b0e089ef8872495d

  • SSDEEP

    12288:iK8ajDkdtDweNktVsFqEQML6304FUEaOyb5B4bCJIXj0be/TtIYIkn7aZB6usLi7:eajDatUeNktVI1L630jOMT4bCJIXJ/Bm

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      invoice.pdf.exe

    • Size

      841KB

    • MD5

      4e1495585f1982eaf5368d897f9b1985

    • SHA1

      42e38b1a6e8e99e5c227afa2eec7d69a769f9a52

    • SHA256

      cbb385b8529f8c65542da6de1561bac167da44c7de62a3f82407182db4aab8ff

    • SHA512

      8b85444b75ae621907d28f4d9b8155bcf00a977328c395f5e99523f64176fa641970840de773143f43bcf0a82cefb14cfd21feeaef9aa7fca3ce1a44b76e1f59

    • SSDEEP

      12288:7caQxt8JvG8LbgDPwFVt2NjFPAgUhNELNBcYwZeJSL/pJ2bjon6r3ZOHnqYkDo:6qb0wFVMNjehiBBcF4JSFob8n6jEHqC

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks