General

  • Target

    479dcbbc23d13aa5673d99fbb466d8e5_JaffaCakes118

  • Size

    890KB

  • Sample

    241015-nwghdawfrj

  • MD5

    479dcbbc23d13aa5673d99fbb466d8e5

  • SHA1

    292ca8ff7ad5b407ff96f61f499a3ec62e2911ff

  • SHA256

    f907f35015057a401f588581ed906e4fff89b53ef5397bb87ffdf92f119e1658

  • SHA512

    ad711695024fa2dc09137fe8b1f324f9995ad5dcef3c69c9d714a4494bf4006ee74edfcb19dafced1c52df2d2fcd443b90c815296b7c1b84c2cfb5f0364e282c

  • SSDEEP

    24576:d6KJPp9AR95yl8tGTZDNmsAdNDkSHKZxoil:jPpKRye4ZDNmsGNgSqQ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cncsiyee.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    blessmegod@77

Targets

    • Target

      479dcbbc23d13aa5673d99fbb466d8e5_JaffaCakes118

    • Size

      890KB

    • MD5

      479dcbbc23d13aa5673d99fbb466d8e5

    • SHA1

      292ca8ff7ad5b407ff96f61f499a3ec62e2911ff

    • SHA256

      f907f35015057a401f588581ed906e4fff89b53ef5397bb87ffdf92f119e1658

    • SHA512

      ad711695024fa2dc09137fe8b1f324f9995ad5dcef3c69c9d714a4494bf4006ee74edfcb19dafced1c52df2d2fcd443b90c815296b7c1b84c2cfb5f0364e282c

    • SSDEEP

      24576:d6KJPp9AR95yl8tGTZDNmsAdNDkSHKZxoil:jPpKRye4ZDNmsGNgSqQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks