General

  • Target

    eecc6be362d1f4223eec9334199dc498_JaffaCakes118

  • Size

    393KB

  • Sample

    241214-ptwpystndr

  • MD5

    eecc6be362d1f4223eec9334199dc498

  • SHA1

    a5fd36b888bccc8c3f7fdbe8cc8f42c23d700e69

  • SHA256

    fcf5c2329dbad1684337638e545f020e317f9d8851ede9df053d1eada85e4c3f

  • SHA512

    db77bc203fc465af66dbf893fc383b0ee4dbe85806c5493ea65291a89a6a44b2e32230d1f0e2e5b1b82e61e288a101a49ac9ab92d295072fdb1630f6469bad56

  • SSDEEP

    12288:8Zr+OYww01F9KWLHhm1jyjoKbgqlAUOi1Nwh4:8Z6gQhyclUOs

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      eecc6be362d1f4223eec9334199dc498_JaffaCakes118

    • Size

      393KB

    • MD5

      eecc6be362d1f4223eec9334199dc498

    • SHA1

      a5fd36b888bccc8c3f7fdbe8cc8f42c23d700e69

    • SHA256

      fcf5c2329dbad1684337638e545f020e317f9d8851ede9df053d1eada85e4c3f

    • SHA512

      db77bc203fc465af66dbf893fc383b0ee4dbe85806c5493ea65291a89a6a44b2e32230d1f0e2e5b1b82e61e288a101a49ac9ab92d295072fdb1630f6469bad56

    • SSDEEP

      12288:8Zr+OYww01F9KWLHhm1jyjoKbgqlAUOi1Nwh4:8Z6gQhyclUOs

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks