General

  • Target

    3a14a680964f769f0494f0a93b094053_JaffaCakes118

  • Size

    212KB

  • Sample

    241012-pyn6ns1crc

  • MD5

    3a14a680964f769f0494f0a93b094053

  • SHA1

    73a08467f59767d6dfcf62c0a3f6383f0c927806

  • SHA256

    f7e47995a608e38eabffd469cfbc78a9966f2effa6c3818aac95504930a6d892

  • SHA512

    8df65f4dc4c924b0cede141f91a6878dd7e1a70f9f7ae236bc3b28a49b77530a8359b051c74b1e45a9f9c983c1668a89cdf08936ee645c8d7cc894db98acb374

  • SSDEEP

    3072:dmQtrYjo4IfK76P7p9c/UvT5zpgU+3AfKcyt194aQj27Cs/O7F0hYpNX:ds707XqUNyU/icyTWACASp

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.ggraco.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    admin@#1235

Targets

    • Target

      3a14a680964f769f0494f0a93b094053_JaffaCakes118

    • Size

      212KB

    • MD5

      3a14a680964f769f0494f0a93b094053

    • SHA1

      73a08467f59767d6dfcf62c0a3f6383f0c927806

    • SHA256

      f7e47995a608e38eabffd469cfbc78a9966f2effa6c3818aac95504930a6d892

    • SHA512

      8df65f4dc4c924b0cede141f91a6878dd7e1a70f9f7ae236bc3b28a49b77530a8359b051c74b1e45a9f9c983c1668a89cdf08936ee645c8d7cc894db98acb374

    • SSDEEP

      3072:dmQtrYjo4IfK76P7p9c/UvT5zpgU+3AfKcyt194aQj27Cs/O7F0hYpNX:ds707XqUNyU/icyTWACASp

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks