General

  • Target

    3af340fdee742584314758be8c8a6c04_JaffaCakes118

  • Size

    982KB

  • Sample

    241012-trgv8stdpm

  • MD5

    3af340fdee742584314758be8c8a6c04

  • SHA1

    0d9a2685066bc9d8c000412aa35ffc59497a0de2

  • SHA256

    0cfbdc8ddf0a18f042cb3098d9212efc1aa037bdeb6b510e8c19464e6cd8e88e

  • SHA512

    069eb9ffcd00077668af32804321cba706b8d66989fdb8eb41d9e57f177032ad46b1b5b15cb27696dfbd2bec52c7f45fa942e52590f8bd915dd07042e7004fa3

  • SSDEEP

    6144:5U5RE6Uqw11qdE5JjvKvA6J1ExQEAH4q854eAk+0ewGZEWYMYsZXjrpsYozyj+lp:aUHqkJTqvJjASe/rxGZ9P1aYMyadAA

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.atlasmat.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    9gf04d0p5KWw

Targets

    • Target

      3af340fdee742584314758be8c8a6c04_JaffaCakes118

    • Size

      982KB

    • MD5

      3af340fdee742584314758be8c8a6c04

    • SHA1

      0d9a2685066bc9d8c000412aa35ffc59497a0de2

    • SHA256

      0cfbdc8ddf0a18f042cb3098d9212efc1aa037bdeb6b510e8c19464e6cd8e88e

    • SHA512

      069eb9ffcd00077668af32804321cba706b8d66989fdb8eb41d9e57f177032ad46b1b5b15cb27696dfbd2bec52c7f45fa942e52590f8bd915dd07042e7004fa3

    • SSDEEP

      6144:5U5RE6Uqw11qdE5JjvKvA6J1ExQEAH4q854eAk+0ewGZEWYMYsZXjrpsYozyj+lp:aUHqkJTqvJjASe/rxGZ9P1aYMyadAA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks