General

  • Target

    4b8dfb73e8a6ef44c5ee1daf91956448_JaffaCakes118

  • Size

    1.2MB

  • Sample

    241016-fypmrsydkn

  • MD5

    4b8dfb73e8a6ef44c5ee1daf91956448

  • SHA1

    d7e7f2ac4d1b472649b9f49a29ad9b8b16c1bf5a

  • SHA256

    a5512bb93b3d36122fe75d5f4cac2904947942704674ab517f4aeeb2eb0a988f

  • SHA512

    15eb62a3c52b0757fb3a0ebb8fe891bf2a6e2268276b7cfc006695265dfd2201373f5611a3de7168c778d1c50c2aceda05061f42fe64555cc25348013fea056e

  • SSDEEP

    12288:Zfoa6SHABUTQgjfNGGypLNRTdN3+bawXlknS79N1PB0ozDbj1dtaEwN4Q6H+Uy19:Jz6GA+pNGGyb9dJ49kS7d75hWZZS5R0

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.kemede.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    TZT*$vm6

Targets

    • Target

      4b8dfb73e8a6ef44c5ee1daf91956448_JaffaCakes118

    • Size

      1.2MB

    • MD5

      4b8dfb73e8a6ef44c5ee1daf91956448

    • SHA1

      d7e7f2ac4d1b472649b9f49a29ad9b8b16c1bf5a

    • SHA256

      a5512bb93b3d36122fe75d5f4cac2904947942704674ab517f4aeeb2eb0a988f

    • SHA512

      15eb62a3c52b0757fb3a0ebb8fe891bf2a6e2268276b7cfc006695265dfd2201373f5611a3de7168c778d1c50c2aceda05061f42fe64555cc25348013fea056e

    • SSDEEP

      12288:Zfoa6SHABUTQgjfNGGypLNRTdN3+bawXlknS79N1PB0ozDbj1dtaEwN4Q6H+Uy19:Jz6GA+pNGGyb9dJ49kS7d75hWZZS5R0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks